Sciweavers

648 search results - page 67 / 130
» Authenticated hash tables
Sort
View
WWW
2008
ACM
14 years 8 months ago
Xml data dissemination using automata on top of structured overlay networks
We present a novel approach for filtering XML documents using nondeterministic finite automata and distributed hash tables. Our approach differs architecturally from recent propos...
Iris Miliaraki, Zoi Kaoudi, Manolis Koubarakis
SIGMOD
2004
ACM
109views Database» more  SIGMOD 2004»
14 years 7 months ago
Piers: An Efficient Model for Similarity Search in DNA Sequence Databases
Growing interest in genomic research has resulted in the creation of huge biological sequence databases. In this paper, we present a hash-based pier model for efficient homology s...
Xia Cao, Shuai Cheng Li, Beng Chin Ooi, Anthony K....
CVPR
2009
IEEE
14 years 2 months ago
Disambiguating the recognition of 3D objects
We propose novel algorithms for the detection, segmentation, recognition, and pose estimation of threedimensional objects. Our approach initially infers geometric primitives to de...
Gutemberg Guerra-Filho
ICAS
2009
IEEE
147views Robotics» more  ICAS 2009»
14 years 2 months ago
Fast Estimation of Aggregates in Unstructured Networks
Aggregation of data values plays an important role on distributed computations, in particular over peer-to-peer and sensor networks, as it can provide a summary of some global sys...
Carlos Baquero, Paulo Sérgio Almeida, Raque...
ICDAR
2009
IEEE
14 years 2 months ago
Seal Detection and Recognition: An Approach for Document Indexing
Reliable indexing of documents having seal instances can be achieved by recognizing seal information. This paper presents a novel approach for detecting and classifying such multi...
Partha Pratim Roy, Umapada Pal, Josep Lladó...