Sciweavers

595 search results - page 55 / 119
» Session 7: Demonstrations
Sort
View
JMLR
2012
13 years 5 days ago
A Bayesian Analysis of the Radioactive Releases of Fukushima
The Fukushima Daiichi disaster 11 March, 2011 is considered the largest nuclear accident since the 1986 Chernobyl disaster and has been rated at level 7 on the International Nucle...
Ryota Tomioka, Morten Mørup
ICIP
2005
IEEE
15 years 11 months ago
Learning hidden semantic cues using support vector clustering
This paper presents a method to infer hidden semantic cues by accumulating the knowledge learned from relevance feedback sessions. We propose to explicitly represent a semantic sp...
Jia-Wen Tung, Chiou-Ting Hsu
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
15 years 10 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
WWW
2010
ACM
15 years 4 months ago
Sync kit: a persistent client-side database caching toolkit for data intensive websites
We introduce a client-server toolkit called Sync Kit that demonstrates how client-side database storage can improve the performance of data intensive websites. Sync Kit is designe...
Edward Benson, Adam Marcus 0002, David R. Karger, ...
CIKM
2009
Springer
15 years 4 months ago
Characterizing and predicting search engine switching behavior
Search engine switching describes the voluntarily transition from one Web search engine to another. In this paper we present a study of search engine switching behavior that combi...
Ryen W. White, Susan T. Dumais