Sciweavers

1444 search results - page 255 / 289
» A Question Answering System Supported by Information Extract...
Sort
View
ESORICS
2008
Springer
15 years 1 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
ESEM
2007
ACM
15 years 1 months ago
Mining Software Evolution to Predict Refactoring
Can we predict locations of future refactoring based on the development history? In an empirical study of open source projects we found that attributes of software evolution data ...
Jacek Ratzinger, Thomas Sigmund, Peter Vorburger, ...
SAC
2006
ACM
15 years 5 months ago
Imprecise RDQL: towards generic retrieval in ontologies using similarity joins
Traditional semantic web query languages support a logicbased access to the semantic web. They offer a retrieval (or reasoning) of data based on facts. On the traditional web and...
Abraham Bernstein, Christoph Kiefer
MIR
2010
ACM
234views Multimedia» more  MIR 2010»
15 years 6 months ago
ACQUINE: aesthetic quality inference engine - real-time automatic rating of photo aesthetics
We present ACQUINE - Aesthetic Quality Inference Engine, a publicly accessible system which allows users to upload their photographs and have them rated automatically for aestheti...
Ritendra Datta, James Ze Wang
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
15 years 5 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...