Sciweavers

1931 search results - page 363 / 387
» Why we blog
Sort
View
CIKM
2011
Springer
12 years 9 months ago
Personalizing web search results by reading level
Traditionally, search engines have ignored the reading difficulty of documents and the reading proficiency of users in computing a document ranking. This is one reason why Web se...
Kevyn Collins-Thompson, Paul N. Bennett, Ryen W. W...
IACR
2011
125views more  IACR 2011»
12 years 9 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
CVPR
2007
IEEE
14 years 12 months ago
Bilattice-based Logical Reasoning for Human Detection
The capacity to robustly detect humans in video is a critical component of automated visual surveillance systems. This paper describes a bilattice based logical reasoning approach...
Vinay D. Shet, Jan Neumann, Visvanathan Ramesh, La...
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
14 years 11 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin
MICCAI
2004
Springer
14 years 10 months ago
Profile Scale-Spaces for Multiscale Image Match
Anatomical objects often have complex and varying image appearance at different portions of the boundary; and it is frequently a challenge even to select appropriate scales at whic...
Sean Ho, Guido Gerig