Sciweavers

77016 search results - page 15046 / 15404
» Modelling
Sort
View
131
Voted
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
15 years 6 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
TREC
2003
15 years 6 months ago
Fondazione Ugo Bordoni at TREC 2003: Robust and Web Track
Our participation in TREC 2003 aims to adapt the use of the DFR (Divergence From Randomness) models with Query Expansion (QE) to the robust track and the topic distillation task o...
Giambattista Amati, Claudio Carpineto, Giovanni Ro...
138
Voted
TREC
2003
15 years 6 months ago
Report on the TREC 2003 Experiment: Genomic Track
After retrieval, this simple strategy yield to an important improvement of the average precision: from 17.02 up to 35.80. Task II. Our approach is based on argumentative structurin...
Patrick Ruch, Gilles Cohen, Frédéric...
UAI
2003
15 years 6 months ago
On the Convergence of Bound Optimization Algorithms
Many practitioners who use EM and related algorithms complain that they are sometimes slow. When does this happen, and what can be done about it? In this paper, we study the gener...
Ruslan Salakhutdinov, Sam T. Roweis, Zoubin Ghahra...
VCIP
2003
126views Communications» more  VCIP 2003»
15 years 6 months ago
Media handling for visual information retrieval in VizIR
This paper describes how the handling of visual media objects is implemented in the visual information retrieval project VizIR. Essentially, four areas are concerned: media access...
Horst Eidenberger
« Prev « First page 15046 / 15404 Last » Next »