Sciweavers

890 search results - page 176 / 178
» Evaluating REAL Users, Using REAL Software, Performing REAL ...
Sort
View
CIVR
2007
Springer
144views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Image retrieval on large-scale image databases
Online image repositories such as Flickr contain hundreds of millions of images and are growing quickly. Along with that the needs for supporting indexing, searching and browsing ...
Eva Hörster, Rainer Lienhart, Malcolm Slaney
PVLDB
2010
184views more  PVLDB 2010»
13 years 5 months ago
Adaptive Logging for Mobile Device
Nowadays, due to the increased user requirements of the fast and reliable data management operation for mobile applications, major device vendors use embedded DBMS for their mobil...
Young-Seok Kim, Heegyu Jin, Kyoung-Gu Woo
SIGMOD
2009
ACM
155views Database» more  SIGMOD 2009»
14 years 7 months ago
Efficient top-k algorithms for fuzzy search in string collections
An approximate search query on a collection of strings finds those strings in the collection that are similar to a given query string, where similarity is defined using a given si...
Rares Vernica, Chen Li
SIGMOD
2008
ACM
206views Database» more  SIGMOD 2008»
14 years 7 months ago
Ad-hoc aggregations of ranked lists in the presence of hierarchies
A variety of web sites and web based services produce textual lists at varying time granularities ranked according to several criteria. For example, Google Trends produces lists o...
Nilesh Bansal, Sudipto Guha, Nick Koudas
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...