Sciweavers

2926 search results - page 493 / 586
» Document Analysis
Sort
View
119
Voted
LPAR
2007
Springer
15 years 10 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
142
Voted
SC
2005
ACM
15 years 9 months ago
SPICE: Simulated Pore Interactive Computing Environment
— SPICE aims to understand the vital process of translocation of biomolecules across protein pores by computing the free energy profile of the translocating biomolecule along th...
Shantenu Jha, Peter V. Coveney, Matt J. Harvey
121
Voted
SIGIR
2005
ACM
15 years 9 months ago
Relevance weighting for query independent evidence
A query independent feature, relating perhaps to document content, linkage or usage, can be transformed into a static, per-document relevance weight for use in ranking. The challe...
Nick Craswell, Stephen E. Robertson, Hugo Zaragoza...
SEMWEB
2005
Springer
15 years 9 months ago
Provenance-Based Validation of E-Science Experiments
E-science experiments typically involve many distributed services maintained by different organisations. After an experiment has been executed, it is useful for a scientist to ver...
Sylvia C. Wong, Simon Miles, Weijian Fang, Paul T....
MM
2004
ACM
137views Multimedia» more  MM 2004»
15 years 9 months ago
Towards auto-documentary: tracking the evolution of news stories
News videos constitute an important source of information for tracking and documenting important events. In these videos, news stories are often accompanied by short video shots t...
Pinar Duygulu, Jia-Yu Pan, David A. Forsyth