Sciweavers

72 search results - page 5 / 15
» Reply to Rao et al. and Lee et al
Sort
View
NAACL
2010
14 years 7 months ago
The viability of web-derived polarity lexicons
We examine the viability of building large polarity lexicons semi-automatically from the web. We begin by describing a graph propagation framework inspired by previous work on con...
Leonid Velikovich, Sasha Blair-Goldensohn, Kerry H...
ISMAR
2009
IEEE
15 years 4 months ago
A replication study testing the validity of AR simulation in VR for controlled experiments
It is extremely challenging to run controlled studies comparing multiple Augmented Reality (AR) systems. We use an “AR simulation” approach, in which a Virtual Reality (VR) sy...
Cha Lee, Scott Bonebrake, Tobias Höllerer, Do...
WAW
2009
Springer
187views Algorithms» more  WAW 2009»
15 years 4 months ago
Cluster Based Personalized Search
We study personalized web ranking algorithms based on the existence of document clusterings. Motivated by the topic sensitive page ranking of Haveliwala [19], we develop and imple...
Hyun Chul Lee, Allan Borodin
AINA
2005
IEEE
15 years 3 months ago
Efficient Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chu-Hsing Lin, Wei Lee
CRYPTO
2005
Springer
83views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
A Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...