Sciweavers

567 search results - page 104 / 114
» Collaborative recommender systems: Combining effectiveness a...
Sort
View
ISPEC
2010
Springer
13 years 10 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ACL
1998
13 years 9 months ago
Dialogue Act Tagging with Transformation-Based Learning
For the task of recognizing dialogue acts, we are applying the Transformation-Based Learning (TBL) machine learning algorithm. To circumvent a sparse data problem, we extract valu...
Ken Samuel, Sandra Carberry, K. Vijay-Shanker
ICUMT
2009
13 years 6 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...
WWW
2007
ACM
14 years 9 months ago
Is high-quality vod feasible using P2P swarming?
Peer-to-peer technologies are increasingly becoming the medium of choice for delivering media content, both professional and homegrown, to large user populations. Indeed, current ...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...
CVPR
2008
IEEE
14 years 10 months ago
Enhanced biologically inspired model
It has been demonstrated by Serre et al. that the biologically inspired model (BIM) is effective for object recognition. It outperforms many state-of-the-art methods in challengin...
Yongzhen Huang, Kaiqi Huang, Liangsheng Wang, Dach...