Sciweavers

2176 search results - page 355 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
WISA
2004
Springer
15 years 8 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
ASIACRYPT
2003
Springer
15 years 8 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu
CIKM
2003
Springer
15 years 8 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
122
Voted
CMMR
2003
Springer
121views Music» more  CMMR 2003»
15 years 8 months ago
Evolving Automatically High-Level Music Descriptors from Acoustic Signals
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the fi...
François Pachet, Aymeric Zils
WEBDB
2010
Springer
155views Database» more  WEBDB 2010»
15 years 8 months ago
Learning Topical Transition Probabilities in Click Through Data with Regression Models
The transition of search engine users’ intents has been studied for a long time. The knowledge of intent transition, once discovered, can yield a better understanding of how di...
Xiao Zhang, Prasenjit Mitra