Sciweavers

980 search results - page 137 / 196
» Analyzing Flickr groups
Sort
View
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 10 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
APIN
2006
154views more  APIN 2006»
13 years 10 months ago
Service matching in agent systems
The problem of service and resource matching is being actively discussed currently as a new challenging task for the next generation of semantic discovery approaches for Web servic...
Anton Naumenko, Sergiy Nikitin, Vagan Y. Terziyan
ESWA
2008
127views more  ESWA 2008»
13 years 10 months ago
A two-level relevance feedback mechanism for image retrieval
Content-based image retrieval (CBIR) is a group of techniques that analyzes the visual features (such as color, shape, texture) of an example image or image subregion to find simi...
Pei-Cheng Cheng, Been-Chian Chien, Hao-Ren Ke, Wei...
CN
2006
99views more  CN 2006»
13 years 10 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
CONCURRENCY
2006
140views more  CONCURRENCY 2006»
13 years 10 months ago
An efficient memory operations optimization technique for vector loops on Itanium 2 processors
To keep up with a large degree of instruction level parallelism (ILP), the Itanium 2 cache systems use a complex organization scheme: load/store queues, banking and interleaving. ...
William Jalby, Christophe Lemuet, Sid Ahmed Ali To...