Sciweavers

219 search results - page 16 / 44
» Nearly Private Information Retrieval
Sort
View
ACL
2006
13 years 9 months ago
Segment-Based Hidden Markov Models for Information Extraction
Hidden Markov models (HMMs) are powerful statistical models that have found successful applications in Information Extraction (IE). In current approaches to applying HMMs to IE, a...
Zhenmei Gu, Nick Cercone
IH
2005
Springer
14 years 1 months ago
Censorship Resistance Revisited
Abstract. “Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang
SIGIR
2012
ACM
11 years 10 months ago
Will this #hashtag be popular tomorrow?
Hashtags are widely used in Twitter to define a shared context for events or topics. In this paper, we aim to predict hashtag popularity in near future (i.e., next day). Given a ...
Zongyang Ma, Aixin Sun, Gao Cong
CLEF
2007
Springer
14 years 1 months ago
Towards Annotation-Based Query and Document Expansion for Image Retrieval
Abstract. In this paper we report results of experiments conducted with strategies for improving text-based image retrieval. The adopted strategies were evaluated in the photograph...
Hugo Jair Escalante, Carlos A. Hernández, A...
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
14 years 1 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...