Sciweavers

620 search results - page 35 / 124
» Linking in Context
Sort
View
ICHIM
2001
77views more  ICHIM 2001»
13 years 9 months ago
Networking Historical Sources: A Demand-Side Driven Approach
Many archives have introduced online archival databases in the past few years. However, apart from being independent of place and time, hardly any of these databases make finding ...
Andrea Rosenbusch
CVPR
2010
IEEE
14 years 4 months ago
Reading Between The Lines: Object Localization Using Implicit Cues from Image Tags
Current uses of tagged images typically exploit only the most explicit information: the link between the nouns named and the objects present somewhere in the image. We propose to ...
Sung Ju Hwang, University of Texas, Kristen Grauma...
TSD
1999
Springer
14 years 19 hour ago
The Prague Dependency Treebank: Crossing the Sentence Boundary
The units processed by tagging procedures - both automatic and manual - are sentences as occurring in the texts in the corpus, but the human annotators are instructed to assign ...
Eva Hajicová
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
14 years 1 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
ISCC
2005
IEEE
104views Communications» more  ISCC 2005»
14 years 1 months ago
Bandwidth Guaranteed Routing for Ad Hoc Networks with Interference Consideration
The problem of computing bandwidth guaranteed paths for given flow requests in an ad-hoc network is complicated because neighboring links share the medium. We define the path wi...
Zhanfeng Jia, Rajarshi Gupta, Jean C. Walrand, Pra...