Sciweavers

2482 search results - page 385 / 497
» Analysis and Presentation of Results for Mobile Local Search
Sort
View
ASIACRYPT
1999
Springer
15 years 5 months ago
Equivalent Keys of HPC
This paper presents a weakness in the key schedule of the AES candidate HPC (Hasty Pudding Cipher). It is shown that for the HPC version with a 128-bit key, 1 in 256 keys is weak i...
Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincen...
IJMMS
2006
94views more  IJMMS 2006»
15 years 1 months ago
A framework for understanding trust factors in web-based health advice
Trust is a key factor in consumer decisions about website engagement. Consumers will engage with sites they deem trustworthy and turn away from those they mistrust. In this paper ...
Elizabeth Sillence, Pamela Briggs, Peter Harris, L...
IPM
2000
96views more  IPM 2000»
15 years 1 months ago
Further reflections on TREC
The paper reviews the TREC Programme up to TREC-6 (1997), considering the test results, the substantive findings for IR that follow, and the lessons TREC offers for IR evaluation....
Karen Sparck Jones
ACL
2011
14 years 5 months ago
Learning to Win by Reading Manuals in a Monte-Carlo Framework
This paper presents a novel approach for leveraging automatically extracted textual knowledge to improve the performance of control applications such as games. Our ultimate goal i...
S. R. K. Branavan, David Silver, Regina Barzilay
IJKESDP
2011
107views more  IJKESDP 2011»
14 years 5 months ago
Creating singing vocal expressions by means of interactive evolutionary computation
—Today, researches for singing by computer have attracted attention. VOCALOID1 is an application to realize that aim. By inputing lyrics and melody, users can make songs sung by ...
Akio Watanabe, Hitoshi Iba