Sciweavers

14248 search results - page 2751 / 2850
» Queries
Sort
View
CLEF
2008
Springer
14 years 21 hour ago
A Study of Users' Image Seeking Behaviour in FlickLing
This study aims to explore users' image seeking behaviour when searching for a known, non-annotated image in Flickling provided by iCLEF2008 track. The task assigned to users...
Evgenia Vassilakaki, Frances C. Johnson, Richard J...
COLT
2008
Springer
14 years 20 hour ago
Almost Tight Upper Bound for Finding Fourier Coefficients of Bounded Pseudo- Boolean Functions
A pseudo-Boolean function is a real-valued function defined on {0, 1}n . A k-bounded function is a pseudo-Boolean function that can be expressed as a sum of subfunctions each of w...
Sung-Soon Choi, Kyomin Jung, Jeong Han Kim
CRYPTO
2008
Springer
84views Cryptology» more  CRYPTO 2008»
14 years 17 hour ago
Improved Bounds on Security Reductions for Discrete Log Based Signatures
Despite considerable research efforts, no efficient reduction from the discrete log problem to forging a discrete log based signature (e.g. Schnorr) is currently known. In fact, ne...
Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Loka...
DEBS
2008
ACM
14 years 10 hour ago
A framework for performance evaluation of complex event processing systems
Several new Complex Event Processing (CEP) engines have been recently released, many of which are intended to be used in performance sensitive scenarios - like fraud detection, tr...
Marcelo R. N. Mendes, Pedro Bizarro, Paulo Marques
DEBS
2008
ACM
14 years 10 hour ago
Extending Siena to support more expressive and flexible subscriptions
This paper defines and discusses the implementation of two novel extensions to the Siena Content-based Network (CBN) to extend it to become a Knowledge-based Network (KBN) thereby...
John Keeney, Dominik Roblek, Dominic Jones, David ...
« Prev « First page 2751 / 2850 Last » Next »