Sciweavers

3898 search results - page 677 / 780
» On the Bit Extraction Problem
Sort
View
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 8 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
SIGMOD
2010
ACM
212views Database» more  SIGMOD 2010»
14 years 8 months ago
Understanding deep web search interfaces: a survey
This paper presents a survey on the major approaches to search interface understanding. The Deep Web consists of data that exist on the Web but are inaccessible via text search en...
Ritu Khare, Yuan An, Il-Yeol Song
SMC
2010
IEEE
198views Control Systems» more  SMC 2010»
14 years 8 months ago
Fast tracking of natural textures using fractal snakes
Abstract — The natural environments that robotic applications often encounter can present difficult problems for imagebased task execution. Prior efforts have used both grayscale...
Christopher E. Smith
SWARM
2010
SPRINGER
154views Optimization» more  SWARM 2010»
14 years 8 months ago
An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization
This paper proposes an immune concentration based virus detection approach which utilizes a two-element concentration vector to construct the feature. In this approach, ‘self’ ...
Wei Wang, Pengtao Zhang, Ying Tan
TASLP
2010
108views more  TASLP 2010»
14 years 8 months ago
Exploring Correlation Between ROUGE and Human Evaluation on Meeting Summaries
Abstract—Automatic summarization evaluation is very important to the development of summarization systems. In text summarization, ROUGE has been shown to correlate well with huma...
Feifan Liu, Yang Liu