Sciweavers

1229 search results - page 197 / 246
» Trusted Computing
Sort
View
ICWE
2010
Springer
13 years 5 months ago
Efficient Term Cloud Generation for Streaming Web Content
Large amounts of information are posted daily on the Web, such as articles published online by traditional news agencies or blog posts referring to and commenting on various events...
Odysseas Papapetrou, George Papadakis, Ekaterini I...
COLING
2010
13 years 2 months ago
A Minimum Error Weighting Combination Strategy for Chinese Semantic Role Labeling
Many Semantic Role Labeling (SRL) combination strategies have been proposed and tested on English SRL task. But little is known about how much Chinese SRL can benefit from system ...
Tao Zhuang, Chengqing Zong
WWW
2011
ACM
13 years 2 months ago
Generalized fact-finding
Once information retrieval has located a document, and information extraction has provided its contents, how do we know whether we should actually believe it? Fact-finders are a ...
Jeff Pasternack, Dan Roth
TCSV
2010
13 years 2 months ago
Action Detection in Cluttered Video With Successive Convex Matching
We propose a novel successive convex matching method for human action detection in cluttered video. Human actions are represented as sequences of poses, and specific actions are de...
Hao Jiang, Mark S. Drew, Ze-Nian Li
IACR
2011
107views more  IACR 2011»
12 years 7 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...