Sciweavers

761 search results - page 103 / 153
» Metadata Principles and Practicalities
Sort
View
AIME
2009
Springer
14 years 5 months ago
CORAAL - Towards Deep Exploitation of Textual Resources in Life Sciences
Abstract. Prominent biomedical literature search tools like ScienceDirect, PubMed Central or MEDLINE allow for efficient retrieval of resources based on key words. Due to vast amou...
Vít Novácek, Tudor Groza, Siegfried ...
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 5 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
IDA
2009
Springer
14 years 5 months ago
Estimating Markov Random Field Potentials for Natural Images
Markov Random Field (MRF) models with potentials learned from the data have recently received attention for learning the low-level structure of natural images. A MRF provides a pri...
Urs Köster, Jussi T. Lindgren, Aapo Hyvä...
ISW
2009
Springer
14 years 5 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel
SAT
2009
Springer
153views Hardware» more  SAT 2009»
14 years 5 months ago
Does Advice Help to Prove Propositional Tautologies?
One of the starting points of propositional proof complexity is the seminal paper by Cook and Reckhow [6], where they defined propositional proof systems as poly-time computable f...
Olaf Beyersdorff, Sebastian Müller