Sciweavers

446 search results - page 2 / 90
» Who's Got the Key
Sort
View
MM
2006
ACM
124views Multimedia» more  MM 2006»
14 years 28 days ago
3WNews: who, where, and when in news video
We describe 3WNews as a novel system for browsing news video by the people (who) and locations (where) appearing in the footage as well as the time (when) of news events. The peop...
Jun Yang 0003, Alexander G. Hauptmann
DAARC
2007
Springer
124views Algorithms» more  DAARC 2007»
14 years 1 months ago
"Who Are We Talking About?" Tracking the Referent in a Question Answering Series
Abstract. The capability of handling anaphora is becoming a key feature for Question Answering systems, as it can play a crucial role at different stages of the QA loop. At the qu...
Matteo Negri, Milen Kouylekov
SIGUCCS
1998
ACM
13 years 11 months ago
IT Training for Students, Who Needs It?
This presentation will be a discussion of two Information Technology training programs at the university/college level. The two programs are ”The Student Peer Trainers”(SPT) a...
Penny Haselwander
I3E
2003
77views Business» more  I3E 2003»
13 years 8 months ago
Who are the Internet Content Providers?
: The Internet continues its growth as a medium for the sale of goods and services – and yet, although it would seem that digital content was one of the most obvious products for...
Cornelia C. Krueger, Paula M. C. Swatman
PPL
2010
147views more  PPL 2010»
13 years 5 months ago
Key Distribution versus Key Enhancement in Quantum Cryptography
It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, ...
Naya Nagy, Marius Nagy, Selim G. Akl