Sciweavers

682 search results - page 78 / 137
» Classifying arguments by scheme
Sort
View
EJIS
2007
97views more  EJIS 2007»
14 years 9 months ago
Analyzing IS research productivity: an inclusive approach to global IS scholarship
An increasing number of studies have appeared that evaluate and rank journal quality and the productivity of IS scholars and their institutions. In this paper, we describe the res...
Michael J. Gallivan, Raquel Benbunan-Fich
ESORICS
2009
Springer
15 years 10 months ago
Formal Indistinguishability Extended to the Random Oracle Model
Abstract. Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of...
Cristian Ene, Yassine Lakhnech, Van Chan Ngo
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
MIR
2005
ACM
198views Multimedia» more  MIR 2005»
15 years 3 months ago
Semi-automatic video annotation based on active learning with multiple complementary predictors
In this paper, we will propose a novel semi-automatic annotation scheme for video semantic classification. It is well known that the large gap between high-level semantics and low...
Yan Song, Xian-Sheng Hua, Li-Rong Dai, Meng Wang
ICDE
2004
IEEE
155views Database» more  ICDE 2004»
15 years 11 months ago
BIDE: Efficient Mining of Frequent Closed Sequences
Previous studies have presented convincing arguments that a frequent pattern mining algorithm should not mine all frequent patterns but only the closed ones because the latter lea...
Jianyong Wang, Jiawei Han