Sciweavers

2824 search results - page 327 / 565
» Text Generation from Keywords
Sort
View
VLDB
2006
ACM
122views Database» more  VLDB 2006»
16 years 4 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
CORR
2010
Springer
130views Education» more  CORR 2010»
15 years 4 months ago
Channel Capacity Limitations versus Hardware Implementation for UWB Impulse Radio Communications
Abstract. Starting from the Shannon channel capacity, we propose an IRUWB channel capacity based on the delay spread for multipath time variant channels. This IR-UWB channel capaci...
Aubin Lecointre, Daniela Dragomirescu, Robert Plan...
CRYPTOLOGIA
2007
53views more  CRYPTOLOGIA 2007»
15 years 4 months ago
Rejewski's Catalog
When attacking the German Enigma cipher machine during the 1930s, the Polish mathematician Marian Rejewski developed a catalog of disjoint cycles of permutations generated by Enigm...
Alex Kuhl
WWW
2004
ACM
16 years 4 months ago
Visualising student tracking data to support instructors in web-based distance education
This paper presents a novel approach of using web log data generated by course management systems (CMS) to help instructors become aware of what is happening in distance learning ...
Riccardo Mazza, Vania Dimitrova
SIGMOD
2009
ACM
269views Database» more  SIGMOD 2009»
16 years 4 months ago
Efficient approximate entity extraction with edit distance constraints
Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respe...
Wei Wang 0011, Chuan Xiao, Xuemin Lin, Chengqi Zha...