Sciweavers

775 search results - page 96 / 155
» Relevance Ranking Using Kernels
Sort
View
ASIACRYPT
2000
Springer
15 years 7 months ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
WCRE
2009
IEEE
15 years 9 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
INEX
2005
Springer
15 years 8 months ago
INEX 2005 Multimedia Track
In this article the activities of the INEX 2005 Multimedia track are reported. We succesfully realized our objective, to provide an evaluation platform for the evaluation of retrie...
Roelof van Zwol, Gabriella Kazai, Mounia Lalmas
IJCAI
2003
15 years 4 months ago
Personalisation of Web Search
The availability of web search has revolutionised the way people discover information, yet as search services maintain larger and larger indexes they are in danger of becoming a v...
Kevin Keenoy, Mark Levene
ISMIR
2004
Springer
149views Music» more  ISMIR 2004»
15 years 8 months ago
Indexing and Retrieval of Music Documents through Pattern Analysis and Data Fusion Techniques
One of the challenges of music information retrieval is the automatic extraction of effective content descriptors of music documents, which can be used at indexing and at retrieva...
Giovanna Neve, Nicola Orio