Sciweavers

4860 search results - page 871 / 972
» SNPs Problems, Complexity, and Algorithms
Sort
View
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
15 years 5 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
AAAI
2010
15 years 5 months ago
Decision-Theoretic Control of Crowd-Sourced Workflows
Crowd-sourcing is a recent framework in which human intelligence tasks are outsourced to a crowd of unknown people ("workers") as an open call (e.g., on Amazon's Me...
Peng Dai, Mausam, Daniel S. Weld
ICMLA
2007
15 years 5 months ago
Scalable optimal linear representation for face and object recognition
Optimal Component Analysis (OCA) is a linear method for feature extraction and dimension reduction. It has been widely used in many applications such as face and object recognitio...
Yiming Wu, Xiuwen Liu, Washington Mio
LREC
2008
155views Education» more  LREC 2008»
15 years 5 months ago
L-ISA: Learning Domain Specific Isa-Relations from the Web
Automated extraction of ontological knowledge from text corpora is a relevant task in Natural Language Processing. In this paper, we focus on the problem of finding hypernyms for ...
Alessandra Potrich, Emanuele Pianta
EFDBS
2001
15 years 5 months ago
Extensible Grouping and Aggregation for Data Reconciliation
New applications from the areas of analytical data processing and data integration require powerful features to condense and reconcile available data. Object-relational and other d...
Eike Schallehn, Kai-Uwe Sattler, Gunter Saake