Sciweavers

2654 search results - page 509 / 531
» On Pairing Inversion Problems
Sort
View
86
Voted
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 6 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
MM
2004
ACM
112views Multimedia» more  MM 2004»
15 years 6 months ago
LyricAlly: automatic synchronization of acoustic musical signals and textual lyrics
We present a prototype that automatically aligns acoustic musical signals with their corresponding textual lyrics, in a manner similar to manually-aligned karaoke. We tackle this ...
Ye Wang, Min-Yen Kan, Tin Lay Nwe, Arun Shenoy, Ju...
92
Voted
MM
2004
ACM
86views Multimedia» more  MM 2004»
15 years 6 months ago
Efficient propagation for face annotation in family albums
In this paper, we propose and investigate a new user scenario for face annotation, in which users are allowed to multi-select a group of photographs and assign names to these phot...
Lei Zhang, Yuxiao Hu, Mingjing Li, Wei-Ying Ma, Ho...
SAC
2004
ACM
15 years 6 months ago
Forest trees for on-line data
This paper presents an hybrid adaptive system for induction of forest of trees from data streams. The Ultra Fast Forest Tree system (UFFT) is an incremental algorithm, with consta...
João Gama, Pedro Medas, Ricardo Rocha
98
Voted
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin