Sciweavers

8301 search results - page 1615 / 1661
» Risk-Aware Information Retrieval
Sort
View
GI
2007
Springer
14 years 1 months ago
Informationsextraktion durch Verwendung Computerlinguistischer Verfahren in Texten mit Makrostruktur
Abstract: In diesem Beitrag wird ein System vorgestellt, mit dem semistrukturierte militärische Aufklärungsmeldungen analysiert werden können, um ontologiegestützt ein automati...
Frank Reinert, Patrick Waldschmitt, Sandro Leuchte...
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
14 years 1 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
INFOCOM
2006
IEEE
14 years 1 months ago
The Internet Dark Matter - on the Missing Links in the AS Connectivity Map
Abstract— The topological structure of the Internet infrastructure is an important and interesting subject that attracted significant research attention in the last few years. A...
Rami Cohen, Danny Raz
IRI
2006
IEEE
14 years 1 months ago
T2K2: A type II KASER
—The transformational methodology described in this paper induces new knowledge, which may be open under any deductive process. The method of transposition is used to maintain a ...
Stuart Harvey Rubin, Shu-Ching Chen, James B. Law
ACMDIS
2006
ACM
14 years 1 months ago
Design research for a context-aware capture system to support biology education
Automatic capture technology could enable students to record and index much information—both digital and nondigital—with little extra effort. Can this technology be designed t...
Abe Crystal
« Prev « First page 1615 / 1661 Last » Next »