Sciweavers

2784 search results - page 230 / 557
» Relation Extraction with Relation Topics
Sort
View
SRDS
1993
IEEE
15 years 9 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
EWHCI
1993
15 years 9 months ago
Model of Utterance and Its Use in Cooperative Response Generation
: A cooperative response model is proposed for interactive intelligent systems that recognizes user intentions and makes cooperative responses. Though many models developed so far ...
Koichi Yamada, Riichiro Mizoguchi, Naoki Harada, A...
ACII
2007
Springer
15 years 9 months ago
Towards Affective-Psychophysiological Foundations for Music Production
Abstract. This paper describes affective and psychophysiological foundations used to help to control affective content in music production. Our work includes the proposal of a know...
António Pedro Oliveira, Amílcar Card...
ICIAR
2010
Springer
15 years 9 months ago
A Geometric Data Structure Applicable to Image Mining and Retrieval
Abstract. Due to improvements in image acquisition and storage technology, terabyte-sized databases of images are nowadays common. This abundance of data leads us to two basic prob...
T. Iwaszko, Mahmoud Melkemi, Lhassane Idoumghar
EGOV
2009
Springer
15 years 9 months ago
Mapping the E-Government Research with Social Network Analysis
About fifteen years of e-government research (EGR) lead to a research field that is looking forward to define an identity as a proper and autonomous scientific discipline. This pap...
Nusa Erman, Ljupco Todorovski