Sciweavers

1554 search results - page 249 / 311
» cases 2003
Sort
View
CIVR
2005
Springer
165views Image Analysis» more  CIVR 2005»
14 years 11 months ago
The Use and Utility of High-Level Semantic Features in Video Retrieval
Abstract. This paper investigates the applicability of high-level semantic features for video retrieval using the benchmarked data from TRECVID 2003 and 2004, addressing the contri...
Michael G. Christel, Alexander G. Hauptmann
CTRSA
2008
Springer
134views Cryptology» more  CTRSA 2008»
14 years 11 months ago
An Efficient Protocol for Fair Secure Two-Party Computation
In the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withstanding semi-honest adversaries, which is based on so-called garbled circuits...
Mehmet S. Kiraz, Berry Schoenmakers
ERCIMDL
2008
Springer
107views Education» more  ERCIMDL 2008»
14 years 11 months ago
Revisiting Lexical Signatures to (Re-)Discover Web Pages
A lexical signature (LS) is a small set of terms derived from a document that capture the "aboutness" of that document. A LS generated from a web page can be used to disc...
Martin Klein, Michael L. Nelson
ESWS
2008
Springer
14 years 11 months ago
Building a National Semantic Web Ontology and Ontology Service Infrastructure -The FinnONTO Approach
Abstract. This paper presents the vision and results of creating a national level cross-domain ontology and ontology service infrastructure in Finland. The novelty of the infrastru...
Eero Hyvönen, Kim Viljanen, Jouni Tuominen, K...
AAAI
2006
14 years 11 months ago
Optimal Scheduling of Contract Algorithms for Anytime Problems
A contract algorithm is an algorithm which is given, as part of the input, a specified amount of allowable computation time. The algorithm must then compute a solution within the ...
Alejandro López-Ortiz, Spyros Angelopoulos,...