Sciweavers

2577 search results - page 338 / 516
» Multimedia Question Answering
Sort
View
TIT
1998
102views more  TIT 1998»
15 years 4 months ago
On Characterization of Entropy Function via Information Inequalities
—Given n discrete random variables = fX1;111; Xng, associated with any subset of f1; 2; 111; ng, there is a joint entropy H(X ) where X = fXi:i 2 g. This can be viewed as a f...
Zhen Zhang, Raymond W. Yeung
STOC
2009
ACM
156views Algorithms» more  STOC 2009»
16 years 5 months ago
Polynomial-time theory of matrix groups
We consider matrix groups, specified by a list of generators, over finite fields. The two most basic questions about such groups are membership in and the order of the group. Even...
László Babai, Robert Beals, Á...
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 5 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
149
Voted
ETELEMED
2009
IEEE
171views Healthcare» more  ETELEMED 2009»
15 years 11 months ago
Drivers and Challenges of Wireless Solutions in Future Healthcare
What do IT oriented healthcare people think to be most attractive and credible wireless applications in healthcare? What do they think about the challenges? These questions were p...
Esko Alasaarela, Ravi Nemana, Steven DeMello
151
Voted
SIGUCCS
2006
ACM
15 years 11 months ago
We got the message: creating an instant messenger service point
Figuring out the best way to communicate with and serve students is one of the paramount challenges facing library and technology organizations today, including Bucknell Universit...
Jason Snyder, Meredith Field