Sciweavers

43264 search results - page 8169 / 8653
» Comparing models of computation
Sort
View
CIS
2005
Springer
15 years 9 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
CIVR
2005
Springer
15 years 9 months ago
EMD-Based Video Clip Retrieval by Many-to-Many Matching
This paper presents a new approach for video clip retrieval based on Earth Mover’s Distance (EMD). Instead of imposing one-to-one matching constraint as in [11, 14], our approach...
Yuxin Peng, Chong-Wah Ngo
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
15 years 9 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
DCOSS
2005
Springer
15 years 9 months ago
Infrastructure-Establishment from Scratch in Wireless Sensor Networks
Abstract. We present a distributed, localized and integrated approach for establishing both low-level (i.e. exploration of 1-hop neighbors, interference avoidance) and high-level (...
Stefan Funke, Nikola Milosavljevic
DIS
2005
Springer
15 years 9 months ago
Exploring Predicate-Argument Relations for Named Entity Recognition in the Molecular Biology Domain
In this paper, the semantic relationships between a predicate and its arguments in terms of semantic roles are employed to improve lexical-based named entity recognition (NER) in t...
Tuangthong Wattarujeekrit, Nigel Collier
« Prev « First page 8169 / 8653 Last » Next »