Sciweavers

2097 search results - page 44 / 420
» Distributed user modelling for universal information access
Sort
View
TRECVID
2008
15 years 5 months ago
University of Sheffield at TRECVID 2008: Rushes Summarisation and Video Copy Detection
This paper presents our experiments on TRECVID workshop 2008. This year we participated in two challenging tasks, rushes video summarisation and video copy detection tasks. We stu...
Siripinyo Chantamunee, Yoshihiko Gotoh
ICITS
2009
15 years 1 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
IASTEDSE
2004
15 years 5 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
142
Voted
CIKM
2008
Springer
15 years 6 months ago
Retrievability: an evaluation measure for higher order information access tasks
Evaluation in Information Retrieval (IR) has long focused on effectiveness and efficiency. However, new and emerging access tasks now demand alternative evaluation measures which ...
Leif Azzopardi, Vishwa Vinay
DEXA
2003
Springer
146views Database» more  DEXA 2003»
15 years 9 months ago
An Access Time Cost Model for Spatial Range Queries on Broadcast Geographical Data over Air
Wireless data broadcasting is well known for its excellent scalability. Most geographical data, such as weather and traffic, is public information and has a large number of potenti...
Jianting Zhang, Le Gruenwald