Sciweavers

4529 search results - page 84 / 906
» Position Based Cryptography
Sort
View
WWW
2010
ACM
15 years 11 months ago
Beyond position bias: examining result attractiveness as a source of presentation bias in clickthrough data
Leveraging clickthrough data has become a popular approach for evaluating and optimizing information retrieval systems. Although data is plentiful, one must take care when interpr...
Yisong Yue, Rajan Patel, Hein Roehrig
135
Voted
ICRA
2002
IEEE
104views Robotics» more  ICRA 2002»
15 years 10 months ago
Improbability Filtering for Rejecting False Positives
—In this paper we describe a novel approach, called improbability filtering, to rejecting false-positive observations from degrading the tracking performance of an Extended Kalma...
Brett Browning, Michael H. Bowling, Manuela M. Vel...
PAIRING
2007
Springer
15 years 11 months ago
On the Minimal Embedding Field
Let C be a curve of genus g, defined over a finite field Fq, where q = pm for a prime p. Let N be a large integer coprime to p, dividing the order of the Jacobian variety associ...
Laura Hitt
IACR
2011
91views more  IACR 2011»
14 years 4 months ago
Improved Generalized Birthday Attack
Let r, B and w be positive integers. Let C be a linear code of length Bw and subspace of Fr 2. The k-regular-decoding problem is to find a nonzero codeword consisting of w length...
Paul Kirchner
BMCBI
2011
15 years 2 days ago
PileLine: a toolbox to handle genome position information in next-generation sequencing studies
Background: Genomic position (GP) files currently used in next-generation sequencing (NGS) studies are always difficult to manipulate due to their huge size and the lack of approp...
Daniel Glez-Peña, Gonzalo Gómez-L&oa...