Sciweavers

8349 search results - page 1590 / 1670
» Introduction to Information Retrieval
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 7 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
INFOCOM
2006
IEEE
15 years 7 months ago
The Internet Dark Matter - on the Missing Links in the AS Connectivity Map
Abstract— The topological structure of the Internet infrastructure is an important and interesting subject that attracted significant research attention in the last few years. A...
Rami Cohen, Danny Raz
IRI
2006
IEEE
15 years 7 months ago
T2K2: A type II KASER
—The transformational methodology described in this paper induces new knowledge, which may be open under any deductive process. The method of transposition is used to maintain a ...
Stuart Harvey Rubin, Shu-Ching Chen, James B. Law
ACMDIS
2006
ACM
15 years 7 months ago
Design research for a context-aware capture system to support biology education
Automatic capture technology could enable students to record and index much information—both digital and nondigital—with little extra effort. Can this technology be designed t...
Abe Crystal
MIR
2006
ACM
267views Multimedia» more  MIR 2006»
15 years 7 months ago
Matching slides to presentation videos using SIFT and scene background matching
We present a general approach for automatically matching electronic slides to videos of corresponding presentations for use in distance learning and video proceedings of conferenc...
Quanfu Fan, Kobus Barnard, Arnon Amir, Alon Efrat,...
« Prev « First page 1590 / 1670 Last » Next »