Sciweavers

562 search results - page 72 / 113
» Third quarter 2008
Sort
View
CIKM
2008
Springer
13 years 11 months ago
A generative retrieval model for structured documents
Structured documents contain elements defined by the author(s) and annotations assigned by other people or processes. Structured documents pose challenges for probabilistic retrie...
Le Zhao, Jamie Callan
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 11 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
CLEF
2008
Springer
13 years 11 months ago
Using Visual Concepts and Fast Visual Diversity to Improve Image Retrieval
In this article, we focus our efforts (i) on the study of how to automatically extract and exploit visual concepts and (ii) on fast visual diversity. First, in the Visual Concept D...
Sabrina Tollari, Marcin Detyniecki, Ali Fakeri-Tab...
CONEXT
2008
ACM
13 years 11 months ago
Towards systematic design of enterprise networks
Enterprise networks are important, with size and complexity even surpassing carrier networks. Yet, the design of enterprise networks remains ad-hoc and poorly understood. In this p...
Yu-Wei Eric Sung, Sanjay G. Rao, Geoffrey G. Xie, ...
CSCLP
2008
Springer
13 years 11 months ago
Challenges in Constraint-Based Analysis of Hybrid Systems
In the analysis of hybrid discrete-continuous systems, rich arithmetic constraint formulae with complex Boolean structure arise naturally. The iSAT algorithm, a solver for such for...
Andreas Eggers, Natalia Kalinnik, Stefan Kupfersch...