Sciweavers

486 search results - page 79 / 98
» What was the Query
Sort
View
EUROCRYPT
2008
Springer
15 years 6 months ago
Security/Efficiency Tradeoffs for Permutation-Based Hashing
We provide attacks and analysis that capture a tradeoff, in the ideal-permutation model, between the speed of a permutation-based hash function and its potential security. For coll...
Phillip Rogaway, John P. Steinberger
AAAI
2010
15 years 6 months ago
Integrity Constraints in OWL
In many data-centric applications, it is desirable to use OWL as an expressive schema language with which one expresses constraints that must be satisfied by instance data. However...
Jiao Tao, Evren Sirin, Jie Bao, Deborah L. McGuinn...
LREC
2008
90views Education» more  LREC 2008»
15 years 6 months ago
Navigating through Dense Annotation Spaces
Pattern matching, or querying, over annotations is a general purpose paradigm for inspecting, navigating, mining, and transforming annotation repositories--the common representati...
Branimir Boguraev, Mary S. Neff
IKE
2007
15 years 6 months ago
Understanding Latent Semantic Indexing: A Topological Structure Analysis Using Q-Analysis Method
Abstract – The method of latent semantic indexing (LSI) is well known for tackling the synonymy and polysemy problems in information retrieval. However, its performance can be ve...
Dandan Li, Chungping Kwong
DAGSTUHL
2006
15 years 6 months ago
A User-Oriented Approach to Music Information Retrieval
Search and retrieval of specific musical content such as emotive or sonic features has become an important aspect of Music Information Retrieval system development, but only little...
Micheline Lesaffre, Marc Leman, Jean-Pierre Marten...