Sciweavers

2926 search results - page 487 / 586
» Document Analysis
Sort
View
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
15 years 8 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
120
Voted
ACL
1998
15 years 5 months ago
Improving Automatic Indexing through Concept Combination and Term Enrichment
Although indexes may overlap, the output of an automatic indexer is generally presented as a fiat and unstructured list of terms. Our purpose is to exploit term overlap and embedd...
Christian Jacquemin
CIKM
2008
Springer
15 years 5 months ago
A random walk on the red carpet: rating movies with user reviews and pagerank
Although PageRank has been designed to estimate the popularity of Web pages, it is a general algorithm that can be applied to the analysis of other graphs other than one of hypert...
Derry Tanti Wijaya, Stéphane Bressan
178
Voted
SIGIR
2012
ACM
13 years 6 months ago
Building reputation and trust using federated search and opinion mining
The term online reputation addresses trust relationships amongst agents in dynamic open systems. These can appear as ratings, recommendations, referrals and feedback. Several repu...
Somayeh Khatiban
AIED
2009
Springer
15 years 10 months ago
Assessing Student Paraphrases Using Lexical Semantics and Word Weighting
We present in this paper an approach to assessing student paraphrases in the intelligent tutoring system iSTART. The approach is based on measuring the semantic similarity between ...
Vasile Rus, Mihai C. Lintean, Arthur C. Graesser, ...