Sciweavers

1056 search results - page 163 / 212
» A Probabilistic Applied Pi-Calculus
Sort
View
SIGIR
2005
ACM
14 years 2 months ago
Relevance weighting for query independent evidence
A query independent feature, relating perhaps to document content, linkage or usage, can be transformed into a static, per-document relevance weight for use in ranking. The challe...
Nick Craswell, Stephen E. Robertson, Hugo Zaragoza...
WS
2005
ACM
14 years 2 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
14 years 2 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
IPMI
2005
Springer
14 years 2 months ago
Knowledge-Driven Automated Detection of Pleural Plaques and Thickening in High Resolution CT of the Lung
Consistent efforts are being made to build Computer-Aided Detection and Diagnosis systems for radiological images. Such systems depend on automated detection of various disease pat...
Mamatha Rudrapatna, Van Mai, Arcot Sowmya, Peter W...
MCS
2005
Springer
14 years 2 months ago
Mixture of Gaussian Processes for Combining Multiple Modalities
This paper describes a unified approach, based on Gaussian Processes, for achieving sensor fusion under the problematic conditions of missing channels and noisy labels. Under the ...
Ashish Kapoor, Hyungil Ahn, Rosalind W. Picard