Sciweavers

5575 search results - page 1076 / 1115
» Information Extraction
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
15 years 11 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
97
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
15 years 11 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
15 years 11 months ago
Visualized Classification of Multiple Sample Types
The goal of the knowledge discovery and data mining is to extract the useful knowledge from the given data. Visualization enables us to find structures, features, patterns, and re...
Li Zhang, Aidong Zhang, Murali Ramanathan
CHI
2008
ACM
15 years 11 months ago
Readability of scanned books in digital libraries
Displaying scanned book pages in a web browser is difficult, due to an array of characteristics of the common user's configuration that compound to yield text that is degrade...
Alexander J. Quinn, Chang Hu, Takeshi Arisaka, Ann...
CHI
2005
ACM
15 years 11 months ago
Examining task engagement in sensor-based statistical models of human interruptibility
The computer and communication systems that office workers currently use tend to interrupt at inappropriate times or unduly demand attention because they have no way to determine ...
James Fogarty, Andrew Jensen Ko, Htet Htet Aung, E...
« Prev « First page 1076 / 1115 Last » Next »