Sciweavers

23590 search results - page 4665 / 4718
» Algorithm Performance Contest
Sort
View
SIGIR
2008
ACM
15 years 2 months ago
A study of methods for negative relevance feedback
Negative relevance feedback is a special case of relevance feedback where we do not have any positive example; this often happens when the topic is difficult and the search result...
Xuanhui Wang, Hui Fang, ChengXiang Zhai
IJISEC
2007
61views more  IJISEC 2007»
15 years 2 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
AES
2005
Springer
137views Cryptology» more  AES 2005»
15 years 2 months ago
Design of a multimedia processor based on metrics computation
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-...
Nader Ben Amor, Yannick Le Moullec, Jean-Philippe ...
AIM
2005
15 years 2 months ago
Semantic Integration in Text: From Ambiguous Names to Identifiable Entities
Intelligent access to information requires semantic integration of structured databases with unstructured textual resources. While the semantic integration problem has been widely...
Xin Li, Paul Morie, Dan Roth
IJON
2007
88views more  IJON 2007»
15 years 2 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett
« Prev « First page 4665 / 4718 Last » Next »