Sciweavers

3954 search results - page 525 / 791
» Image-based Model Completion
Sort
View
129
Voted
ICALP
2005
Springer
15 years 9 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
ICIAR
2005
Springer
15 years 9 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
LPNMR
2005
Springer
15 years 9 months ago
Guarded Open Answer Set Programming
Open answer set programming (OASP) is an extension of answer set programming where one may ground a program with an arbitrary superset of the program’s constants. We define a ...
Stijn Heymans, Davy Van Nieuwenborgh, Dirk Vermeir
NLDB
2005
Springer
15 years 9 months ago
Combining Data-Driven Systems for Improving Named Entity Recognition
Abstract. The increasing flow of digital information requires the extraction, filtering and classification of pertinent information from large volumes of texts. An important pre...
Zornitsa Kozareva, Óscar Ferrández, ...
IUI
2004
ACM
15 years 9 months ago
Designing example-critiquing interaction
In many practical scenarios, users are faced with the problem of choosing the most preferred outcome from a large set of possibilities. As people are unable to sift through them m...
Boi Faltings, Pearl Pu, Marc Torrens, Paolo Viappi...