Sciweavers

940 search results - page 154 / 188
» New Cryptanalytic Results on IDEA
Sort
View
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
ICCV
2003
IEEE
15 years 11 months ago
Dominant Sets and Hierarchical Clustering
Dominant sets are a new graph-theoretic concept that has proven to be relevant in partitional (flat) clustering as well as image segmentation problems. However, in many computer v...
Massimiliano Pavan, Marcello Pelillo
73
Voted
ISBI
2004
IEEE
15 years 10 months ago
A Unified Feature-Based Registration Method for Multimodality Images
While mutual information-based methods have become popular for image registration, the question of what underlying feature to use is rarely discussed. Instead, it is implicitly as...
Jie Zhang, Anand Rangarajan
WWW
2002
ACM
15 years 10 months ago
Probabilistic query expansion using query logs
Query expansion has long been suggested as an effective way to resolve the short query and word mismatching problems. A number of query expansion methods have been proposed in tra...
Hang Cui, Ji-Rong Wen, Jian-Yun Nie, Wei-Ying Ma
CHI
2003
ACM
15 years 10 months ago
Sense and sensibility: evaluation and interactive art
HCI evaluation methods are useful for improving the design of interactive systems, yet they may be rejected by nontraditional technology disciplines such as media art. We have dev...
Gerd Andersson, Kristina Höök, Phoebe Se...