Sciweavers

680 search results - page 56 / 136
» Locating Hidden Servers
Sort
View
147
Voted
SIGIR
2003
ACM
15 years 9 months ago
Table extraction using conditional random fields
The ability to find tables and extract information from them is a necessary component of data mining, question answering, and other information retrieval tasks. Documents often c...
David Pinto, Andrew McCallum, Xing Wei, W. Bruce C...
155
Voted
DAGSTUHL
2007
15 years 5 months ago
Logical Particle Filtering
Abstract. In this paper, we consider the problem of filtering in relational hidden Markov models. We present a compact representation for such models and an associated logical par...
Luke S. Zettlemoyer, Hanna M. Pasula, Leslie Pack ...
117
Voted
TIT
2008
164views more  TIT 2008»
15 years 3 months ago
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes
We investigate the decoding problem of Reed-Solomon (RS) Codes, also known as the Polynomial Reconstruction Problem (PR), from a cryptographic hardness perspective. Namely, we dea...
Aggelos Kiayias, Moti Yung
137
Voted
ICAPR
2005
Springer
15 years 9 months ago
Symmetric Hash Functions for Fingerprint Minutiae
Abstract. The possibility that a database with biometric data is compromised is one of the main concerns in implementing biometric identification systems. In this paper we present...
Sergey Tulyakov, Faisal Farooq, Venu Govindaraju
ICDCS
2009
IEEE
16 years 25 days ago
Optimizing File Retrieval in Delay-Tolerant Content Distribution Community
In WiFi-based content distribution community infrastructure (CDCI), file servers are deployed in diverse locations around cities, caching popular files interesting to a communit...
Ying Huang, Yan Gao, Klara Nahrstedt, Wenbo He