Sciweavers

1437 search results - page 108 / 288
» Content Extraction Signatures
Sort
View
123
Voted
DOCENG
2009
ACM
15 years 9 months ago
Object-level document analysis of PDF files
The PDF format is commonly used for the exchange of documents on the Web and there is a growing need to understand and extract or repurpose data held in PDF documents. Many system...
Tamir Hassan
115
Voted
LREC
2010
169views Education» more  LREC 2010»
15 years 4 months ago
An Evaluation of Technologies for Knowledge Base Population
Previous content extraction evaluations have neglected to address problems which complicate the incorporation of extracted information into an existing knowledge base. Previous qu...
Paul McNamee, Hoa Trang Dang, Heather Simpson, Pat...
160
Voted
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 9 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
106
Voted
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 7 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
TOG
2010
156views more  TOG 2010»
14 years 9 months ago
Style-content separation by anisotropic part scales
We perform co-analysis of a set of man-made 3D objects to allow the creation of novel instances derived from the set. We analyze the objects at the part level and treat the anisot...
Kai Xu 0004, Honghua Li, Hao Zhang 0002, Daniel Co...