Sciweavers

503 search results - page 57 / 101
» Authenticity by tagging and typing
Sort
View
ANLP
2000
100views more  ANLP 2000»
13 years 10 months ago
REES: A Large-Scale Relation and Event Extraction System
This paper reports on a large-scale, end-toend relation and event extraction system. At present, the system extracts a total of 100 types of relations and events, which represents...
Chinatsu Aone, Mila Ramos-Santacruz
COLING
2010
13 years 3 months ago
A Hierarchical Classifier Applied to Multi-way Sentiment Detection
This paper considers the problem of document-level multi-way sentiment detection, proposing a hierarchical classifier algorithm that accounts for the inter-class similarity of tag...
Adrian Bickerstaffe, Ingrid Zukerman
ICIP
1994
IEEE
14 years 10 months ago
A Digital Watermark
This paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capa...
Ron G. van Schyndel, Andrew Z. Tirkel, C. F. Osbor...
ACSAC
2009
IEEE
14 years 3 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
FSTTCS
2009
Springer
14 years 3 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...