Sciweavers

878 search results - page 158 / 176
» Clustering the Chilean Web
Sort
View
NDSS
2002
IEEE
14 years 21 days ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
VLDB
1998
ACM
105views Database» more  VLDB 1998»
14 years 4 hour ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...
EPIA
2009
Springer
13 years 11 months ago
Semantic Image Search and Subset Selection for Classifier Training in Object Recognition
Abstract. Robots need to ground their external vocabulary and internal symbols in observations of the world. In recent works, this problem has been approached through combinations ...
Rui Pereira, Luís Seabra Lopes, Augusto Sil...
CNSR
2004
IEEE
13 years 11 months ago
A Topic Sharing Infrastructure for Weblog Networks
Weblogs have recently emerged as a popular means of sharing information on the Web. While they effectively foster the networking of participants on a one-to-one basis, so far they...
Sébastien Paquet, Phillip Pearson
CCGRID
2006
IEEE
13 years 11 months ago
Building Cyberinfrastructure for Bioinformatics Using Service Oriented Architecture
-- Cyberinfrastructure makes the development and deployment of bioinformatics applications easier by providing the framework and components that may be loosely coupled using servic...
Wilfred W. Li, Sriram Krishnan, Kurt Mueller, Kohe...