Sciweavers

14248 search results - page 2751 / 2850
» Queries
Sort
View
97
Voted
CLEF
2008
Springer
15 years 4 months ago
A Study of Users' Image Seeking Behaviour in FlickLing
This study aims to explore users' image seeking behaviour when searching for a known, non-annotated image in Flickling provided by iCLEF2008 track. The task assigned to users...
Evgenia Vassilakaki, Frances C. Johnson, Richard J...
COLT
2008
Springer
15 years 4 months ago
Almost Tight Upper Bound for Finding Fourier Coefficients of Bounded Pseudo- Boolean Functions
A pseudo-Boolean function is a real-valued function defined on {0, 1}n . A k-bounded function is a pseudo-Boolean function that can be expressed as a sum of subfunctions each of w...
Sung-Soon Choi, Kyomin Jung, Jeong Han Kim
112
Voted
CRYPTO
2008
Springer
84views Cryptology» more  CRYPTO 2008»
15 years 4 months ago
Improved Bounds on Security Reductions for Discrete Log Based Signatures
Despite considerable research efforts, no efficient reduction from the discrete log problem to forging a discrete log based signature (e.g. Schnorr) is currently known. In fact, ne...
Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Loka...
141
Voted
DEBS
2008
ACM
15 years 4 months ago
A framework for performance evaluation of complex event processing systems
Several new Complex Event Processing (CEP) engines have been recently released, many of which are intended to be used in performance sensitive scenarios - like fraud detection, tr...
Marcelo R. N. Mendes, Pedro Bizarro, Paulo Marques
133
Voted
DEBS
2008
ACM
15 years 4 months ago
Extending Siena to support more expressive and flexible subscriptions
This paper defines and discusses the implementation of two novel extensions to the Siena Content-based Network (CBN) to extend it to become a Knowledge-based Network (KBN) thereby...
John Keeney, Dominik Roblek, Dominic Jones, David ...
« Prev « First page 2751 / 2850 Last » Next »