Sciweavers

371 search results - page 44 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 3 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
92
Voted
WWW
2007
ACM
15 years 10 months ago
OntoWiki: A Tool for Social, Semantic Collaboration
Abstract We present OntoWiki, a tool providing support for agile, distributed knowledge engineering scenarios. OntoWiki facilitates the visual presentation of a knowledge base as a...
Jens Lehmann, Sören Auer, Sebastian Dietzold,...
86
Voted
ACL
1998
14 years 11 months ago
Investigating Regular Sense Extensions Based on Intersective Levin Classes
In this paper we specifically address questions of polysemy with respect to verbs, and how regular extensions of meaning can be achieved through the adjunction of particular synta...
Hoa Trang Dang, Karin Kipper, Martha Stone Palmer,...
BMCBI
2007
134views more  BMCBI 2007»
14 years 9 months ago
Benchmarking natural-language parsers for biological applications using dependency graphs
Background: Interest is growing in the application of syntactic parsers to natural language processing problems in biology, but assessing their performance is difficult because di...
Andrew B. Clegg, Adrian J. Shepherd