Sciweavers

12257 search results - page 2140 / 2452
» Analysis of Algorithms
Sort
View
154
Voted
ASIASIM
2004
Springer
15 years 9 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
AUSAI
2004
Springer
15 years 9 months ago
Analyzing the Effect of Query Class on Document Retrieval Performance
Abstract. Analysis of queries posed to open-domain question-answering systems indicates that particular types of queries are dominant, e.g., queries about the identity of people, a...
Pawel Kowalczyk, Ingrid Zukerman, Michael Niemann
BIOADIT
2004
Springer
15 years 9 months ago
Explaining Low-Level Brightness-Contrast Illusions Using Disinhibition
Conventional Difference of Gaussian (DOG) filter is usually used to model the early stage of visual processing. However, convolution operation used with DOG does not explicitly a...
Yingwei Yu, Takashi Yamauchi, Yoonsuck Choe
CEAS
2004
Springer
15 years 9 months ago
Learning to Extract Signature and Reply Lines from Email
: We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessi...
Vitor Rocha de Carvalho, William W. Cohen
COLT
2004
Springer
15 years 9 months ago
Concentration Bounds for Unigrams Language Model
Abstract. We show several PAC-style concentration bounds for learning unigrams language model. One interesting quantity is the probability of all words appearing exactly k times in...
Evgeny Drukh, Yishay Mansour
« Prev « First page 2140 / 2452 Last » Next »