Sciweavers

12264 search results - page 2385 / 2453
» Analysis of the rubberband algorithm
Sort
View
SIGIR
2004
ACM
14 years 3 months ago
A search engine for historical manuscript images
Many museum and library archives are digitizing their large collections of handwritten historical manuscripts to enable public access to them. These collections are only available...
Toni M. Rath, R. Manmatha, Victor Lavrenko
SIGIR
2004
ACM
14 years 3 months ago
Resource selection for domain-specific cross-lingual IR
An under-explored question in cross-language information retrieval (CLIR) is to what degree the performance of CLIR methods depends on the availability of high-quality translation...
Monica Rogati, Yiming Yang
CCS
2004
ACM
14 years 3 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
CCS
2004
ACM
14 years 3 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
CIKM
2004
Springer
14 years 3 months ago
SWAM: a family of access methods for similarity-search in peer-to-peer data networks
Peer-to-peer Data Networks (PDNs) are large-scale, selforganizing, distributed query processing systems. Familiar examples of PDN are peer-to-peer file-sharing networks, which su...
Farnoush Banaei Kashani, Cyrus Shahabi
« Prev « First page 2385 / 2453 Last » Next »