Sciweavers

2066 search results - page 329 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
SIGUCCS
2003
ACM
14 years 2 months ago
Training program growth...: from flat line to pulsating
IT Training and Communications is a division of Information Technology Services (ITS), which provides computer application training for the faculty and staff at Saint Louis Univer...
Sue A. Moore
ICCV
2007
IEEE
14 years 11 months ago
People-LDA: Anchoring Topics to People using Face Recognition
Topic models have recently emerged as powerful tools for modeling topical trends in documents. Often the resulting topics are broad and generic, associating large groups of people...
Vidit Jain, Erik G. Learned-Miller, Andrew McCallu...

Publication
104views
14 years 6 months ago
Finding My Needle in the Haystack: Effective Personalized Re-ranking of Search Results in Prospector
Abstract. This paper provides an overview of Prospector, a personalized Internet meta-search engine, which utilizes a combination of ontological information, ratings-based models o...
Florian König, Lex van Velsen, Alexandros Par...
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
DAM
2006
121views more  DAM 2006»
13 years 9 months ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski