Sciweavers

980 search results - page 137 / 196
» Analyzing Flickr groups
Sort
View
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 2 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
APIN
2006
154views more  APIN 2006»
15 years 2 months ago
Service matching in agent systems
The problem of service and resource matching is being actively discussed currently as a new challenging task for the next generation of semantic discovery approaches for Web servic...
Anton Naumenko, Sergiy Nikitin, Vagan Y. Terziyan
ESWA
2008
127views more  ESWA 2008»
15 years 2 months ago
A two-level relevance feedback mechanism for image retrieval
Content-based image retrieval (CBIR) is a group of techniques that analyzes the visual features (such as color, shape, texture) of an example image or image subregion to find simi...
Pei-Cheng Cheng, Been-Chian Chien, Hao-Ren Ke, Wei...
CN
2006
99views more  CN 2006»
15 years 2 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
CONCURRENCY
2006
140views more  CONCURRENCY 2006»
15 years 2 months ago
An efficient memory operations optimization technique for vector loops on Itanium 2 processors
To keep up with a large degree of instruction level parallelism (ILP), the Itanium 2 cache systems use a complex organization scheme: load/store queues, banking and interleaving. ...
William Jalby, Christophe Lemuet, Sid Ahmed Ali To...