Sciweavers

700 search results - page 125 / 140
» words 2005
Sort
View
IWSEC
2007
Springer
15 years 10 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
MLG
2007
Springer
15 years 10 months ago
Weighted Substructure Mining for Image Analysis
1 In web-related applications of image categorization, it is desirable to derive an interpretable classification rule with high accuracy. Using the bag-of-words representation and...
Sebastian Nowozin, Koji Tsuda, Takeaki Uno, Taku K...
CW
2005
IEEE
15 years 10 months ago
Applying Transformation-Based Error-Driven Learning to Structured Natural Language Queries
XML information retrieval (XML-IR) systems aim to provide users with highly exhaustive and highly specific results. To interact with XML-IR systems, users must express both their ...
Alan Woodley, Shlomo Geva
ENC
2005
IEEE
15 years 10 months ago
Hard Problem Generation for MKP
We developed generators that produce challenging MKP instances. Our approaches uses independently exponential distributions over a wide range to generate the constraint coefficien...
Maria A. Osorio, Germn Cuaya
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
15 years 10 months ago
Learning Effectiveness in Web-Based Technology-Mediated Virtual Learning Environment
A framework that delineates the relationships between learner control and learning effectiveness is absent. This study aims to fill this void. Unlike previous research, this study...
Shih-Wei Chou, Chien-Hung Liu