Sciweavers

5580 search results - page 983 / 1116
» Randomized priority algorithms
Sort
View
FSE
2008
Springer
177views Cryptology» more  FSE 2008»
13 years 10 months ago
MD4 is Not One-Way
MD4 is a hash function introduced by Rivest in 1990. It is still used in some contexts, and the most commonly used hash function (MD5, SHA-1, SHA-2) are based on the design princip...
Gaëtan Leurent
BIOCOMP
2007
13 years 10 months ago
Quality-Based Similarity Search for Biological Sequence Databases
Low-Complexity Regions (LCRs) of biological sequences are the main source of false positives in similarity searches for biological sequence databases. We consider the problem of ï...
Xuehui Li, Tamer Kahveci
BNCOD
2007
236views Database» more  BNCOD 2007»
13 years 10 months ago
Wordrank: A Method for Ranking Web Pages Based on Content Similarity
This paper presents WordRank, a new page ranking system, which exploits similarity between interconnected pages. WordRank introduces the model of the ‘biased surfer’ which is ...
Apostolos Kritikopoulos, Martha Sideri, Iraklis Va...
LREC
2010
309views Education» more  LREC 2010»
13 years 10 months ago
Comment Extraction from Blog Posts and Its Applications to Opinion Mining
Blog posts containing many personal experiences or perspectives toward specific subjects are useful. Blogs allow readers to interact with bloggers by placing comments on specific ...
Huan-An Kao, Hsin-Hsi Chen
GRAPHICSINTERFACE
2007
13 years 10 months ago
Spectral graph-theoretic approach to 3D mesh watermarking
We propose a robust and imperceptible spectral watermarking method for high rate embedding of a watermark into 3D polygonal meshes. Our approach consists of four main steps: (1) t...
Emad E. Abdallah, A. Ben Hamza, Prabir Bhattachary...