Sciweavers

3841 search results - page 674 / 769
» Crowdsourcing for search evaluation
Sort
View
JAIR
2010
131views more  JAIR 2010»
13 years 9 months ago
Narrative Planning: Balancing Plot and Character
Narrative, and in particular storytelling, is an important part of the human experience. Consequently, computational systems that can reason about narrative can be more effective...
Mark O. Riedl, R. Michael Young
TASLP
2008
122views more  TASLP 2008»
13 years 9 months ago
Challenging Uncertainty in Query by Humming Systems: A Fingerprinting Approach
Robust data retrieval in the presence of uncertainty is a challenging problem in multimedia information retrieval. In query-by-humming (QBH) systems, uncertainty can arise in query...
Erdem Unal, Elaine Chew, Panayiotis G. Georgiou, S...
KBSE
2010
IEEE
13 years 9 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer
PVLDB
2010
122views more  PVLDB 2010»
13 years 9 months ago
On Graph Query Optimization in Large Networks
The dramatic proliferation of sophisticated networks has resulted in a growing need for supporting effective querying and mining methods over such large-scale graph-structured da...
Peixiang Zhao, Jiawei Han
ASIACRYPT
2010
Springer
13 years 9 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir