Sciweavers

1656 search results - page 177 / 332
» Labeling Schemes with Queries
Sort
View
CRYPTO
2000
Springer
120views Cryptology» more  CRYPTO 2000»
14 years 12 days ago
L-collision Attacks against Randomized MACs
In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added...
Michael Semanko
VIP
2003
13 years 9 months ago
Relevance Feedback for Content-Based Image Retrieval Using Bayesian Network
Relevance feedback is a powerful query modification technique in the field of content-based image retrieval. The key issue in relevance feedback is how to effectively utilize the ...
Jing Xin, Jesse S. Jin
PAA
2006
13 years 8 months ago
Audio-visual sports highlights extraction using Coupled Hidden Markov Models
We present our studies on the application of Coupled Hidden Markov Models(CHMMs) to sports highlights extraction from broadcast video using both audio and video information. First,...
Ziyou Xiong
ICDE
2008
IEEE
190views Database» more  ICDE 2008»
14 years 9 months ago
Adaptive Segmentation for Scientific Databases
In this paper we explore database segmentation in the context of a column-store DBMS targeted at a scientific database. We present a novel hardware- and scheme-oblivious segmentati...
Milena Ivanova, Martin L. Kersten, Niels Nes
DKE
2006
94views more  DKE 2006»
13 years 8 months ago
Extending the data warehouse for service provisioning data
The last few years, there has been an extensive body of literature in data warehousing applications that primarily focuses on basket-type (transactional) data, common in retail in...
Yannis Kotidis