Sciweavers

1437 search results - page 8 / 288
» Content Extraction Signatures
Sort
View
ER
2007
Springer
99views Database» more  ER 2007»
14 years 1 months ago
VERT: A Semantic Approach for Content Search and Content Extraction in XML Query Processing
Processing a twig pattern query in XML document includes structural search and content search. Most existing algorithms only focus on structural search. They treat content nodes th...
Huayu Wu, Tok Wang Ling, Bo Chen
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
13 years 11 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
ISW
2004
Springer
14 years 22 days ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
SIAMIS
2008
211views more  SIAMIS 2008»
13 years 7 months ago
Sparse and Redundant Modeling of Image Content Using an Image-Signature-Dictionary
Modeling signals by sparse and redundant representations has been drawing considerable attention in recent years. Coupled with the ability to train the dictionary using signal exam...
Michal Aharon, Michael Elad