Sciweavers

543 search results - page 61 / 109
» A Theory of Plan Modification
Sort
View
MM
2004
ACM
104views Multimedia» more  MM 2004»
15 years 3 months ago
A robust and accumulator-free ellipse hough transform
The ellipse Hough transform (EHT) is a widely-used technique. Most of the previous modifications to the standard EHT improved either the voting procedure that computes the absolut...
Xinguo Yu, Hon Wai Leong, Changsheng Xu, Qi Tian
AH
2006
Springer
15 years 1 months ago
A Comparative Study of Compound Critique Generation in Conversational Recommender Systems
Abstract. Critiquing techniques provide an easy way for users to feedback their preferences over one or several attributes of the products in a conversational recommender system. W...
Jiyong Zhang, Pearl Pu
ASIACRYPT
2006
Springer
15 years 1 months ago
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the a...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
DRM
2008
Springer
14 years 11 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu