Sciweavers

3926 search results - page 119 / 786
» Deriving Information Requirements from Responsibility Models
Sort
View
CCS
2001
ACM
15 years 8 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
SIGIR
2006
ACM
15 years 10 months ago
Learning a ranking from pairwise preferences
We introduce a novel approach to combining rankings from multiple retrieval systems. We use a logistic regression model or an SVM to learn a ranking from pairwise document prefere...
Ben Carterette, Desislava Petkova
IADIS
2004
15 years 5 months ago
A profile-based architecture for a flexible and personalized information access
Information relevance is an important issue in information access techniques. A solution for improving this relevance is the personalization or adaptation of the answers provided ...
Max Chevalier, Chantal Soulé-Dupuy, Pascali...
IJCV
2010
169views more  IJCV 2010»
15 years 2 months ago
Rigid Structure from Motion from a Blind Source Separation Perspective
We present an information theoretic approach to define the problem of structure from motion (SfM) as a blind source separation one. Given that for almost all practical joint densi...
Jeff Fortuna, Aleix M. Martínez
DNA
2006
Springer
110views Bioinformatics» more  DNA 2006»
15 years 8 months ago
DNA Hypernetworks for Information Storage and Retrieval
Content-addressability is a fundamental feature of human memory underlying many associative information retrieval tasks. In contrast to location-based memory devices, content-addre...
Byoung-Tak Zhang, Joo-Kyung Kim