Sciweavers

3777 search results - page 636 / 756
» Estimating the Quality of Databases
Sort
View
143
Voted
GIS
2009
ACM
15 years 1 months ago
Distortion-based anonymity for continuous queries in location-based mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
Xiao Pan, Xiaofeng Meng, Jianliang Xu
2839
Voted
CVPR
2011
IEEE
1506views Computer Vision» more  CVPR 2011»
14 years 11 months ago
What makes an image memorable?
When glancing at a magazine, or browsing the Internet, we are continuously being exposed to photographs. Despite of this overflow of visual information, humans are extremely good...
Phillip Isola, Jianxiong Xiao, Aude Oliva, Antonio...
122
Voted
PAMI
2011
14 years 10 months ago
Latent Fingerprint Matching
Latent fingerprint identification is of critical importance in forensics. While tremendous progress has been made in the field of automatic fingerprint identification, latent...
Anil K. Jain, Jianjiang Feng
125
Voted
WWW
2011
ACM
14 years 10 months ago
Trust analysis with clustering
Web provides rich information about a variety of objects. Trustability is a major concern on the web. Truth establishment is an important task so as to provide the right informati...
Manish Gupta, Yizhou Sun, Jiawei Han
147
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 10 months ago
A Knowledge Recommend System Based on User Model
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...
Jiagen Sheng, Sifeng Liu