In this paper, the FEELING-G system for extracting and building semantic representations of emotions, feelings and psychological states expressed in texts is presented, as well as the linguistic knowledge used by the ...
详细信息
In this paper, the FEELING-G system for extracting and building semantic representations of emotions, feelings and psychological states expressed in texts is presented, as well as the linguistic knowledge used by the system. Semantic representations are described by means of a set of feature structures. Letters to the Editor is taken as a domain for the evaluation of this work.
We report on an application of language modeling techniques to the retrieval of Farsi documents. We discovered that language modeling improves the precision of retrieval when compared to a standard vector space model.
We report on an application of language modeling techniques to the retrieval of Farsi documents. We discovered that language modeling improves the precision of retrieval when compared to a standard vector space model.
When several information items are presented simultaneously, the potential exists for users to interact with information in a rich and rewarding way. The MultiBrowser system supports such interaction via an informatio...
详细信息
When several information items are presented simultaneously, the potential exists for users to interact with information in a rich and rewarding way. The MultiBrowser system supports such interaction via an information foraging style of hypermedia browsing. Multiple windows, colored bars that provide visual cues, and automatically inserted hyperlinks among the paragraphs in a document set contribute to the structure of repositories created by MultiBrowser. These repositories are browsable over the Web using an ordinary Web browser.
Using commutative cryptosystems is a way to obtain efficient mental poker protocols which do not require using a trusted third party (TTP). However, the security of such protocols depends on the particular cryptosyste...
详细信息
Using commutative cryptosystems is a way to obtain efficient mental poker protocols which do not require using a trusted third party (TTP). However, the security of such protocols depends on the particular cryptosystem used. We show that a TTP-free mental poker protocol using an ElGamal-like commutative cryptosystem is insecure.
A data hiding scheme for high-quality video is introduced, to deal with security and synchronization issues and achieve a compact representation of the source video stream. Specifically, both the chrominance component...
详细信息
A data hiding scheme for high-quality video is introduced, to deal with security and synchronization issues and achieve a compact representation of the source video stream. Specifically, both the chrominance components of the video frames and the audio signal after watermarking, are hidden in the wavelet transform coefficients of the luminance component, on a frame-by-frame basis.
This paper presents results of an experiment performed on DCT block-based image watermarking algorithm. It also proposes and describes four factors that influence the performance of DCT block-based image watermarking ...
详细信息
This paper presents results of an experiment performed on DCT block-based image watermarking algorithm. It also proposes and describes four factors that influence the performance of DCT block-based image watermarking algorithm. The experimental results show a great improvement on the performance of implementing the DCT block-based along with the proposed four factors.
The paradigm of grid computing has been successfully applied in the domain of computationally-intensive applications supporting scientific research using server-class computers interconnected by wired network. The use...
详细信息
The paradigm of grid computing has been successfully applied in the domain of computationally-intensive applications supporting scientific research using server-class computers interconnected by wired network. The users of the existing and growing number of wireless mobile devices often demand more computational power than their devices can currently provide. We propose using the computational grid paradigm to build a problem-solving environment for wireless mobile devices.
This paper presents some information about the text filtering and the defects in VSM (vector support machine), introduces the concept of lexical chain and gives the model that builds a lexical-chain based profile. Exp...
详细信息
ISBN:
(纸本)0769521088
This paper presents some information about the text filtering and the defects in VSM (vector support machine), introduces the concept of lexical chain and gives the model that builds a lexical-chain based profile. Experimental results show that the methods based on lexical-chain can improve the text filtering performance.
We propose an improved CRTHACS scheme for secure group communications. The scheme resists several GCD attacks which exist in the original CRTHACS scheme [X. Zou et al., (2001)] and were reported in [R. Steinwandt et a...
详细信息
We propose an improved CRTHACS scheme for secure group communications. The scheme resists several GCD attacks which exist in the original CRTHACS scheme [X. Zou et al., (2001)] and were reported in [R. Steinwandt et al., (2003)].
We propose the FULL-COVERAGE summarizer: an efficient, information retrieval oriented method to extract nonredundant sentences from text for summarization purposes. Our method leverages existing information retrieval ...
详细信息
We propose the FULL-COVERAGE summarizer: an efficient, information retrieval oriented method to extract nonredundant sentences from text for summarization purposes. Our method leverages existing information retrieval technology by extracting key-sentences on the premise that the relevance of a sentence is proportional to its similarity to the whole document. We show that our method can produce sentence-based summaries that are up to 78% smaller than the original text with only 3% loss in retrieval performance.
暂无评论