Sciweavers

649 search results - page 69 / 130
» Search-based query suggestion
Sort
View
CRYPTO
2000
Springer
120views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
L-collision Attacks against Randomized MACs
In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added...
Michael Semanko
COLING
2008
13 years 10 months ago
Class-Driven Attribute Extraction
We report on the large-scale acquisition of class attributes with and without the use of lists of representative instances, as well as the discovery of unary attributes, such as t...
Benjamin Van Durme, Ting Qian, Lenhart Schubert
CNIS
2006
13 years 10 months ago
Self-organising quorum systems for ad hoc networks
There are many essential applications for quorum systems in ad-hoc networks, such as that of location servers in large-scale networks. Existing research proposes many approaches t...
Gareth Owen, Mo Adda
ALENEX
2001
89views Algorithms» more  ALENEX 2001»
13 years 10 months ago
Estimating Resemblance of MIDI Documents
Abstract. Search engines often employ techniques for determining syntactic similarity of Web pages. Such a tool allows them to avoid returning multiple copies of essentially the sa...
Michael Mitzenmacher, Sean Owen
ANLP
2000
123views more  ANLP 2000»
13 years 10 months ago
Word Sense Disambiguation for Cross-Language Information Retrieval
We have developed a word sense disambiguation algorithm, following Cheng and Wilensky (1997), to disambiguate among WordNet synsets. This algorithm is to be used in a cross-langua...
Xiaoyong Liu, Ted Diamond, Anne Diekema