Sciweavers

1656 search results - page 217 / 332
» Labeling Schemes with Queries
Sort
View
IR
2000
13 years 7 months ago
New Approaches to Spoken Document Retrieval
This paper presents four novel techniques for open-vocabulary spoken document retrieval: a method to detect slots that possibly contain a query feature; a method to estimate occurr...
Martin Wechsler, Eugen Munteanu, Peter Schäub...
PVLDB
2008
156views more  PVLDB 2008»
13 years 7 months ago
eXtract: a snippet generation system for XML search
Snippets are used by almost every text search engine to complement ranking schemes in order to effectively handle user keyword search. Despite the fact that XML is a standard repr...
Yu Huang, Ziyang Liu, Yi Chen
IPL
2010
71views more  IPL 2010»
13 years 6 months ago
New common ancestor problems in trees and directed acyclic graphs
We derive a new generalization of lowest common ancestors (LCAs) in dags, called the lowest single common ancestor (LSCA). We show how to preprocess a static dag in linear time su...
Johannes Fischer, Daniel H. Huson
ICPR
2008
IEEE
14 years 9 months ago
Fingerprint indexing based on composite set of reduced SIFT features
Most of current fingerprint indexing schemes utilize features based on global textures and minutiae structures. To extend the existing technology of feature extraction, this paper...
Xin Shuai, Chao Zhang, Pengwei Hao
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz