Sciweavers

2883 search results - page 508 / 577
» Algorithms for merged indexes
Sort
View
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Non-negative matrix factorisation for object class discovery and image auto-annotation
In information retrieval, sub-space techniques are usually used to reveal the latent semantic structure of a data-set by projecting it to a low dimensional space. Non-negative mat...
Jiayu Tang, Paul H. Lewis
CIVR
2008
Springer
106views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Eye localization for face matching: is it always useful and under what conditions?
In this paper we address the influence of eye localization accuracy on face matching performance in the case of low resolution image and video content. By means of a broad experim...
Bart Kroon, Alan Hanjalic, Sander M. P. Maas
CLEF
2008
Springer
13 years 10 months ago
Robust Question Answering for Speech Transcripts: UPC Experience in QAst 2008
This paper describes the participation of the Technical University of Catalonia in the CLEF 2008 Question Answering on Speech Transcripts track. We have participated in the Englis...
Pere Comas, Jordi Turmo
CLEF
2008
Springer
13 years 10 months ago
Logistic Regression for Metadata: Cheshire Takes on Adhoc-TEL
In this paper we will briefly describe the approaches taken by the Berkeley Cheshire Group for the Adhoc-TEL 2008 tasks (Mono and Bilingual retrieval). Since the AdhocTEL task is ...
Ray R. Larson
FSE
2008
Springer
103views Cryptology» more  FSE 2008»
13 years 10 months ago
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for smal...
Subhamoy Maitra, Goutam Paul