Sciweavers

2714 search results - page 342 / 543
» Under the table interaction
Sort
View
CORR
2006
Springer
118views Education» more  CORR 2006»
15 years 4 months ago
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs
Clickthrough data is a particularly inexpensive and plentiful resource to obtain implicit relevance feedback for improving and personalizing search engines. However, it is well kn...
Filip Radlinski, Thorsten Joachims
CVIU
2006
76views more  CVIU 2006»
15 years 4 months ago
Homeostatic image perception: An artificial system
This paper describes how a visual system can automatically define features of interest from the observation of a large enough number of natural images. The principle complements t...
Thomas Feldman, Laurent Younes
DAM
2006
97views more  DAM 2006»
15 years 4 months ago
Entity authentication schemes using braid word reduction
Abstract. Artin's braid groups currently provide a promising background for cryptographical applications, since the first cryptosystems using braids were introduced in [2, 3, ...
Hervé Sibert, Patrick Dehornoy, Marc Giraul...
DI
2006
50views more  DI 2006»
15 years 4 months ago
Improving evidence acquisition from live network sources
The pervasiveness of network technology is causing a shift in the location of digital evidence. What was once largely found on individual disks tied to single individuals is now b...
Bruce J. Nikkel
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 4 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...