Sciweavers

3116 search results - page 588 / 624
» Positively dependent types
Sort
View
AIRWEB
2007
Springer
15 years 3 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
ASIACRYPT
2007
Springer
15 years 3 months ago
When e-th Roots Become Easier Than Factoring
We show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the ...
Antoine Joux, David Naccache, Emmanuel Thomé...
CIVR
2007
Springer
112views Image Analysis» more  CIVR 2007»
15 years 3 months ago
Canonical image selection from the web
The vast majority of the features used in today’s commercially deployed image search systems employ techniques that are largely indistinguishable from text-document search – t...
Yushi Jing, Shumeet Baluja, Henry A. Rowley
ECTEL
2007
Springer
15 years 3 months ago
Scruffy Technologies to Enable (Work-integrated) Learning
Abstract. The goal of the APOSDLE (Advanced Process-Oriented SelfDirected Learning environment) project is to support work-integrated learning of knowledge workers. We argue that w...
Stefanie N. Lindstaedt, Peter Scheir, Armin Ulbric...
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 3 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou