Sciweavers

7296 search results - page 110 / 1460
» informs 2010
Sort
View
CORR
2010
Springer
171views Education» more  CORR 2010»
15 years 5 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
CORR
2010
Springer
119views Education» more  CORR 2010»
15 years 2 months ago
Using Information Theory to Study the Efficiency and Capacity of Computers and Similar Devices
We address the problems of estimating the computer efficiency and the computer capacity. We define the computer efficiency and capacity and suggest a method for their estimation, ...
Boris Ryabko
ACL
2010
15 years 1 months ago
An Entity-Level Approach to Information Extraction
We present a generative model of template-filling in which coreference resolution and role assignment are jointly determined. Underlying template roles nerate abstract entities, w...
Aria Haghighi, Dan Klein
123
Voted
KES
2010
Springer
15 years 3 months ago
From Information to Sense-Making: Fetching and Querying Semantic Repositories
Information, its gathering, sharing, and storage, is growing at a very rapid rate. Information turned into knowledge leads to sensemaking. Ontologies, and their representations in ...
Tope Omitola, Ian Millard, Hugh Glaser, Nicholas G...
IEEECIT
2010
IEEE
15 years 2 months ago
A Photo Visualization System Considering Region of Interest
Dong-Sung Ryu, Seon-Yeong Kim, Hwan-Gue Cho