نتایج جستجو برای: search protocols

تعداد نتایج: 391475  

2001
William E. Walsh Makoto Yokoo Katsutoshi Hirayama Michael P. Wellman

We describe two market-inspired approaches to propositional satisfiability. Whereas a previous market-inspired approach exhibited extremely slow performance, we find that variations on the pricing method with a simplified market structure can improve performance significantly. We compare the performance of the new protocols with the previous market protocol and with the distributed breakout alg...

Journal: :Inf. Syst. 2008
Chuan-Ming Liu Shu-Yu Fu

In a wireless mobile environment, data broadcasting provides an efficient way to disseminate data. Via data broadcasting, a server can provide location-based services to a large client population in a wireless environment. Among different location-based services, the k nearest neighbors (kNN) search is important and is used to find the k closest objects to a given point. However, the kNN search...

Journal: :journal of advances in computer research 2015
shekoofe bostan mohamad ghasemzadeh

in this research work, the impact of user’s behavior on search engine results is discussed. it aims to improvement of search results which leads to the higher satisfaction of users. in other words, we are trying to present a personalized search engine for each user, based on his/her activity and search history. we base our hypothesis that the search history of each user in a specific time frame...

Journal: :bulletin of the iranian mathematical society 2011
h. talebi n. esmailzadeh

this paper considers the search problem, introduced by srivastava cite{sr}. this is a model discrimination problem. in the context of search linear models, discrimination ability of search designs has been studied by several researchers. some criteria have been developed to measure this capability, however, they are restricted in a sense of being able to work for searching only one possible non...

2005
Seunghak Lee Seong-Min Hong Hyunsoo Yoon

SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) without revealing its secret information. In this paper, we propose a new active attack on server-aided secret computation protocols. We describe our attack by using Beguin and Quisquater’s protocol. (We modify the protocol...

2011
Alyssa Schwartzentruber

This critical review examines the effects of free-fluid protocols on individuals with thinliquid dysphagia. A literature search was completed resulting in two studies, four abstracts, and one book chapter that met the inclusion criteria. Study designs included randomized control trials, nonrandomized between groups, and single group. Overall, the research suggests that free-fluid protocols do n...

Journal: :Computer Communications 2011
Boyeon Song Chris J. Mitchell

We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. In support of scalability, some RFID protocols, however, only require constant time for tag identifica...

Journal: :ACM SIGCOMM Computer Communication Review 2007

2015
Émilie Palagi

Exploratory search systems (ESSs) are search engines that help users to explore a topic of interest. A shortcoming of current evaluation methods is that they cannot be used to determine if an ESS can help the user in performing exploratory search tasks. To address this issue, we introduce our approach for designing a user-centered evaluation method for ESSs. Our method takes into account users’...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید