Sciweavers

11151 search results - page 2184 / 2231
» On the Complexity of Model Expansion
Sort
View
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
13 years 9 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
TREC
2003
13 years 9 months ago
Report on the TREC 2003 Experiment: Genomic Track
After retrieval, this simple strategy yield to an important improvement of the average precision: from 17.02 up to 35.80. Task II. Our approach is based on argumentative structurin...
Patrick Ruch, Gilles Cohen, Frédéric...
ECIS
2000
13 years 9 months ago
Information Systems Research Education in Australasia: Continuing the Past or Gearing Up for the Future
As the information systems discipline grows, so do the number of programs offering graduate research degrees (GRD). In Australasia these include one year post-graduate (honors) pr...
Beverley G. Hope, M. Fergusson
NIPS
1997
13 years 9 months ago
Task and Spatial Frequency Effects on Face Specialization
There is strong evidence that face processing is localized in the brain. The double dissociation between prosopagnosia, a face recognition deficit occurring after brain damage, a...
Matthew N. Dailey, Garrison W. Cottrell
WEBNET
1997
13 years 9 months ago
Telemedicine: An Inquiry in the Economic and Social Dynamics of Communications Technologies in the Medical Field
The health care industry in the United States has been experiencing substantial and ever increasing cost pressures. At the same time, many forces are revolutionizing the way healt...
Francis Pereira, Elizabeth Fife, Antonio A. Schuh
« Prev « First page 2184 / 2231 Last » Next »