Sciweavers

3891 search results - page 715 / 779
» Query Models
Sort
View
CSL
2010
Springer
13 years 11 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
ICML
2010
IEEE
13 years 11 months ago
Active Risk Estimation
We address the problem of evaluating the risk of a given model accurately at minimal labeling costs. This problem occurs in situations in which risk estimates cannot be obtained f...
Christoph Sawade, Niels Landwehr, Steffen Bickel, ...
MM
2010
ACM
178views Multimedia» more  MM 2010»
13 years 10 months ago
Topical summarization of web videos by visual-text time-dependent alignment
Search engines are used to return a long list of hundreds or even thousands of videos in response to a query topic. Efficient navigation of videos becomes difficult and users ofte...
Song Tan, Hung-Khoon Tan, Chong-Wah Ngo
MM
2010
ACM
192views Multimedia» more  MM 2010»
13 years 10 months ago
iLike: integrating visual and textual features for vertical search
Content-based image search on the Internet is a challenging problem, mostly due to the semantic gap between low-level visual features and high-level content, as well as the excess...
Yuxin Chen, Nenghai Yu, Bo Luo, Xue-wen Chen
CCR
2010
131views more  CCR 2010»
13 years 10 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...