Sciweavers

8298 search results - page 1604 / 1660
» Geografisches Information Retrieval
Sort
View
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 1 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
ASWC
2006
Springer
15 years 1 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
HT
2010
ACM
15 years 1 months ago
Assessing users' interactions for clustering web documents: a pragmatic approach
In this paper we are interested in describing Web pages by how users interact within their contents. Thus, an alternate but complementary way of labelling and classifying Web docu...
Luis A. Leiva, Enrique Vidal
DEXA
2005
Springer
111views Database» more  DEXA 2005»
15 years 1 months ago
On the General Signature Trees
The signature file method is a popular indexing technique used in information retrieval and databases. It excels in efficient index maintenance and lower space overhead. Different ...
Yangjun Chen
CIVR
2008
Springer
106views Image Analysis» more  CIVR 2008»
15 years 1 months ago
Eye localization for face matching: is it always useful and under what conditions?
In this paper we address the influence of eye localization accuracy on face matching performance in the case of low resolution image and video content. By means of a broad experim...
Bart Kroon, Alan Hanjalic, Sander M. P. Maas
« Prev « First page 1604 / 1660 Last » Next »