Sciweavers

15372 search results - page 3070 / 3075
» The Semantics of Semantic Annotation
Sort
View
109
Voted
CCS
2011
ACM
14 years 1 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
116
Voted
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
14 years 29 days ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
174
Voted
DGO
2011
302views Education» more  DGO 2011»
14 years 28 days ago
An ontology-based interactive tool to search documents in the U.S. patent system
The past few years have seen an explosive growth in scientific and regulatory documents related to the patent system. Relevant information is siloed into many heterogeneous and di...
Siddharth Taduri, Gloria T. Lau, Kincho H. Law, Ha...
272
Voted
CVPR
2009
IEEE
16 years 8 months ago
Multi-Camera Activity Correlation Analysis
We propose a novel approach for modelling correlations between activities in a busy public space captured by multiple non-overlapping and uncalibrated cameras. In our approach, ...
Chen Change Loy (Queen Mary, University of London)...
237
Voted
DAGM
2011
Springer
14 years 28 days ago
Agnostic Domain Adaptation
The supervised learning paradigm assumes in general that both training and test data are sampled from the same distribution. When this assumption is violated, we are in the setting...
Alexander Vezhnevets, Joachim M. Buhmann
« Prev « First page 3070 / 3075 Last » Next »