Sciweavers

2386 search results - page 352 / 478
» Combining Information Retrieval with Information Extraction ...
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 3 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
CONTEXT
2005
Springer
14 years 2 months ago
Task-Realization Models in Contextual Graphs
Enterprises develop procedures to address focuses in any case. However, procedures result often in sub-optimal solutions for any specific focus. As a consequence, each actor develo...
Patrick Brézillon
WETICE
2000
IEEE
14 years 1 months ago
A Web Infrastructure for People and Agent Interaction and Collaboration
Internet pervasive services call for flexible supports to enable a wide degree of collaboration. On the one hand, many people are connected to the Internet and surf the Web not on...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
CHI
2010
ACM
13 years 11 months ago
Countertop responsive mirror: supporting physical retail shopping for sellers, buyers and companions
We examine opportunities for ubiquitous technologies in retail shopping, jewelry shopping in this case, to supplement the unique information needs inherent to physical trials of t...
Maurice Chu, Brinda Dalal, Alan Walendowski, Bo Be...
DAS
2008
Springer
13 years 10 months ago
An End-to-End Administrative Document Analysis System
This paper presents an end-to-end administrative document analysis system. This system uses case-based reasoning in order to process documents from known and unknown classes. For ...
Hatem Hamza, Yolande Belaïd, Abdel Belaï...