Sciweavers

2891 search results - page 485 / 579
» More or Less Elaborate
Sort
View
CIKM
2009
Springer
15 years 5 months ago
Effective and efficient structured retrieval
Search engines that support structured documents typically support structure created by the author (e.g., title, section), and may also support structure added by an annotation pr...
Le Zhao, Jamie Callan
CIKM
2009
Springer
15 years 5 months ago
Fast shortest path distance estimation in large networks
In this paper we study approximate landmark-based methods for point-to-point distance estimation in very large networks. These methods involve selecting a subset of nodes as landm...
Michalis Potamias, Francesco Bonchi, Carlos Castil...
ICB
2009
Springer
142views Biometrics» more  ICB 2009»
15 years 5 months ago
Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints
Law enforcement agencies routinely collect both rolled and plain fingerprints of all the ten fingers of suspects. These two types of fingerprints complement each other, since ro...
Jianjiang Feng, Soweon Yoon, Anil K. Jain
ICCS
2009
Springer
15 years 5 months ago
A Scalable and Adaptable Solution Framework within Components of the Community Climate System Model
Abstract. A framework for a fully implicit solution method is implemented into (1) the High Order Methods Modeling Environment (HOMME), which is a spectral element dynamical core o...
Katherine J. Evans, Damian W. I. Rouson, Andrew G....
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
15 years 5 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks