Sciweavers

5284 search results - page 1030 / 1057
» Ontologizing Semantic Relations
Sort
View
109
Voted
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
14 years 8 days ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
FSTTCS
2009
Springer
15 years 7 months ago
Fractional Pebbling and Thrifty Branching Programs
We study the branching program complexity of the tree evaluation problem, introduced in [BCM+09a] as a candidate for separating NL from LogCFL. The input to the problem is a roote...
Mark Braverman, Stephen A. Cook, Pierre McKenzie, ...
197
Voted
CVPR
2009
IEEE
16 years 7 months ago
Recognizing Realistic Actions from Videos in the Wild
In this paper, we present a systematic framework for re-cognizing realistic actions from videos “in the wild.” Such unconstrained videos are abundant in personal collections as...
Jingen Liu (University of Central Florida), Jiebo ...
CVPR
2008
IEEE
16 years 2 months ago
Semantic-based indexing of fetal anatomies from 3-D ultrasound data using global/semi-local context and sequential sampling
The use of 3-D ultrasound data has several advantages over 2-D ultrasound for fetal biometric measurements, such as considerable decrease in the examination time, possibility of p...
Gustavo Carneiro, Fernando Amat, Bogdan Georgescu,...
123
Voted
WWW
2008
ACM
16 years 1 months ago
As we may perceive: finding the boundaries of compound documents on the web
This paper considers the problem of identifying on the Web compound documents (cDocs) ? groups of web pages that in aggregate constitute semantically coherent information entities...
Pavel Dmitriev
« Prev « First page 1030 / 1057 Last » Next »