Sciweavers

5580 search results - page 949 / 1116
» Meta-level Information Extraction
Sort
View
COST
1994
Springer
159views Multimedia» more  COST 1994»
15 years 8 months ago
A Mail-Based Teleservice Architecture for Archiving and Retrieving Dynamically Composable Multimedia Documents
In this paper, a teleservice for archiving and retrieving multimedia documents using public networks is described. This teleservice encourages a broad range of commercially applic...
Heiko Thimm, Katja Röhr, Thomas C. Rakow
AI
2007
Springer
15 years 8 months ago
Pattern Classification in No-Limit Poker: A Head-Start Evolutionary Approach
We have constructed a poker classification system which makes informed betting decisions based upon three defining features extracted while playing poker: hand value, risk, and agg...
Brien Beattie, Garrett Nicolai, David Gerhard, Rob...
INCDM
2010
Springer
146views Data Mining» more  INCDM 2010»
15 years 8 months ago
Learning from Humanoid Cartoon Designs
Abstract. Character design is a key ingredient to the success of any comicbook, graphic novel, or animated feature. Artists typically use shape, size and proportion as the first de...
Md. Tanvirul Islam, Kaiser Md. Nahiduzzaman, Why Y...
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
15 years 8 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
DAC
2007
ACM
15 years 8 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri