Sciweavers

190 search results - page 26 / 38
» A Simple Proof Technique for Certain Parametricity Results
Sort
View
ICTAI
1999
IEEE
13 years 12 months ago
Face Detection and Its Applications in Intelligent and Focused Image Retrieval
This paper presents a face detection technique and its applications in image retrieval. Even though this face detection method has relatively high false positives and low detectio...
Zhongfei Zhang, Rohini K. Srihari, Aibing Rao
IWOCA
2009
Springer
149views Algorithms» more  IWOCA 2009»
14 years 2 months ago
Randomized Postoptimization of Covering Arrays
The construction of covering arrays with the fewest rows remains a challenging problem. Most computational and recursive constructions result in extensive repetition of coverage. W...
Peyman Nayeri, Charles J. Colbourn, Goran Konjevod
SEMWEB
2009
Springer
14 years 2 months ago
Dynamic Querying of Mass-Storage RDF Data with Rule-Based Entailment Regimes
RDF Schema (RDFS) as a lightweight ontology language is gaining popularity and, consequently, tools for scalable RDFS inference and querying are needed. SPARQL has become recently ...
Giovambattista Ianni, Thomas Krennwallner, Alessan...
FC
2007
Springer
105views Cryptology» more  FC 2007»
13 years 11 months ago
Space-Efficient Private Search with Applications to Rateless Codes
Abstract. Private keyword search is a technique that allows for searching and retrieving documents matching certain keywords without revealing the search criteria. We improve the s...
George Danezis, Claudia Díaz
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
13 years 11 months ago
On Related-Secret Pseudorandomness
Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among ke...
David Goldenberg, Moses Liskov