Sciweavers

85 search results - page 14 / 17
» lisa 2008
Sort
View
ESWS
2008
Springer
13 years 8 months ago
Enhancing Semantic Search using N-Levels Document Representation
The traditional strategy performed by Information Retrieval (IR) systems is ranked keyword search: For a given query, a list of documents, ordered by relevance, is returned. Releva...
Pierpaolo Basile, Annalina Caputo, Anna Lisa Genti...
FOCS
2008
IEEE
14 years 1 months ago
Submodular Approximation: Sampling-based Algorithms and Lower Bounds
We introduce several generalizations of classical computer science problems obtained by replacing simpler objective functions with general submodular functions. The new problems i...
Zoya Svitkina, Lisa Fleischer
WCNC
2008
IEEE
14 years 29 days ago
Using Swarm Intelligence and Bayesian Inference for Aircraft Interrogation
: Sensor management deals with the efficient resource allocation to meet mission objectives of the application, air traffic control. A schedule for the sensors is constructed, whic...
Ganapathi Kamath, Xiang Ye, Lisa Ann Osadciw
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
13 years 8 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
CVPR
2008
IEEE
14 years 8 months ago
SMRFI: Shape matching via registration of vector-valued feature images
We perform shape matching by transforming the problem of establishing shape correspondences into an image registration problem. At each vertex on the shape, we calculate a shape f...
Lisa Tang, Ghassan Hamarneh