Sciweavers

1465 search results - page 130 / 293
» Making database systems usable
Sort
View
PODC
2003
ACM
15 years 7 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
JBI
2002
105views Bioinformatics» more  JBI 2002»
15 years 2 months ago
Information extraction for enhanced access to disease outbreak reports
Document search is generally based on individual terms in the document. However, for collections within limited domains it is possible to provide more powerful access tools. This ...
Ralph Grishman, Silja Huttunen, Roman Yangarber
ICDE
2010
IEEE
224views Database» more  ICDE 2010»
16 years 2 months ago
Probabilistic Declarative Information Extraction
Abstract-Unstructured text represents a large fraction of the world's data. It often contain snippets of structured information within them (e.g., people's names and zip ...
Daisy Zhe Wang, Eirinaios Michelakis, Joseph M. He...
IUI
1999
ACM
15 years 6 months ago
Integrating Organizational Memory and Performance Support
We describe an approach to building integrated performance support systems by using model-based task tracking to link performance support tools to video-based organizational memor...
Christopher R. Johnson, Lawrence Birnbaum, Ray Bar...
118
Voted
ICPR
2004
IEEE
16 years 3 months ago
Three-Dimensional Model Based Face Recognition
The performance of face recognition systems that use twodimensional (2D) images is dependent on consistent conditions such as lighting, pose and facial expression. We are developi...
Anil K. Jain, Dirk Colbry, Xiaoguang Lu