Sciweavers

5643 search results - page 93 / 1129
» Retrieval Evaluation in Practice
Sort
View
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
14 years 8 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
USS
2010
14 years 7 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...
ICASSP
2011
IEEE
14 years 1 months ago
Channel quantization design in multiuser MIMO systems: Asymptotic versus practical conclusions
Feedback of channel state information (CSI) is necessary to achieve high throughput and low outage probability in multiuser multiantenna systems. There are two types of CSI: direc...
Emil Björnson, Konstantinos Ntontin, Bjö...
SIGIR
2008
ACM
14 years 9 months ago
Score standardization for inter-collection comparison of retrieval systems
The goal of system evaluation in information retrieval has always been to determine which of a set of systems is superior on a given collection. The tool used to determine system ...
William Webber, Alistair Moffat, Justin Zobel
SIGIR
2008
ACM
14 years 9 months ago
Evaluation over thousands of queries
Information retrieval evaluation has typically been performed over several dozen queries, each judged to near-completeness. There has been a great deal of recent work on evaluatio...
Ben Carterette, Virgiliu Pavlu, Evangelos Kanoulas...