Sciweavers

1215 search results - page 209 / 243
» CBIR in Distributed Databases using a Multi-Agent System
Sort
View
P2P
2005
IEEE
137views Communications» more  P2P 2005»
14 years 2 months ago
The Essence of P2P: A Reference Architecture for Overlay Networks
The success of the P2P idea has created a huge diversity of approaches, among which overlay networks, for example, Gnutella, Kazaa, Chord, Pastry, Tapestry, P-Grid, or DKS, have r...
Karl Aberer, Luc Onana Alima, Ali Ghodsi, Sarunas ...
SIGIR
2010
ACM
14 years 20 days ago
Image search by concept map
In this paper, we present a novel image search system, image search by concept map. This system enables users to indicate not only what semantic concepts are expected to appear bu...
Hao Xu, Jingdong Wang, Xian-Sheng Hua, Shipeng Li
WSC
2004
13 years 10 months ago
Operational Analysis Framework for Emergency Operations Center Preparedness Training
As the U.S. Department of Homeland Security works to create an integrated emergency response system, it is evident that computer-based solutions can support this process. Individu...
Eytan Pollak, Mark Falash, Lorie Ingraham, Vivian ...
DEBU
2010
129views more  DEBU 2010»
13 years 6 months ago
Flash in a DBMS: Where and How?
Over the past decade, new solid state storage technologies, with flash being the most mature one, have become increasingly popular. Such technologies store data durably, and can a...
Manos Athanassoulis, Anastasia Ailamaki, Shimin Ch...
POLICY
2001
Springer
14 years 1 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...