Sciweavers

7868 search results - page 1531 / 1574
» Learning by Answer Sets
Sort
View
ECTEL
2007
Springer
15 years 11 months ago
Reflections on Digital Literacy
Parallel to the societal diffusion of digital technologies, the debate on their impacts and requirements has created terms like ICT literacy, digital literacy or digital competenc...
Harald Gapski
IWDW
2007
Springer
15 years 11 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
OTM
2007
Springer
15 years 11 months ago
OntoGame: Towards Overcoming the Incentive Bottleneck in Ontology Building
Despite significant advancement in ontology learning, building ontologies remains a task that highly depends on human intelligence, both as a source of domain expertise and for pro...
Katharina Siorpaes, Martin Hepp
RWEB
2007
Springer
15 years 11 months ago
Semantic Descriptions in an Enterprise Search Solution
Today customers want to use powerful search engines for their huge and increasing content repositories. Full-text-only products with simple result lists are not enough to satisfy t...
Uwe Crenze, Stefan Köhler, Kristian Hermsdorf...
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 11 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
« Prev « First page 1531 / 1574 Last » Next »