Sciweavers

173 search results - page 24 / 35
» An evaluation of evolved term-weighting schemes in informati...
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
CLEF
2005
Springer
14 years 1 months ago
Thomson Legal and Regulatory Experiments at CLEF-2005
For the 2005 Cross-Language Evaluation Forum, Thomson Legal and Regulatory participated in the Hungarian, French, and Portuguese monolingual search tasks as well as French-to-Port...
Isabelle Moulinier, Ken Williams
STOC
2003
ACM
178views Algorithms» more  STOC 2003»
14 years 7 months ago
Uniform hashing in constant time and linear space
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing assumption, i.e., the assumption that hash functions behave like truly random fu...
Anna Östlin, Rasmus Pagh
ECIR
2006
Springer
13 years 8 months ago
A Comparative Study of the Effectiveness of Search Result Presentation on the Web
Presentation of search results in Web-based information retrieval (IR) systems has been dominated by a textual form of information such as the title, snippet, URL, and/or file type...
Hideo Joho, Joemon M. Jose
ICIP
2006
IEEE
14 years 1 months ago
A Hierarchical Approach to Rotation-Invariant Texture Feature Extraction Based on Radon Transform Parameters
In this paper, we propose an efficient hierarchical method for extracting invariant texture features using the Gabor wavelets and Radon transform parameters. The proposed method a...
Mahmoud R. Hejazi, Yo-Sung Ho