Sciweavers

3481 search results - page 582 / 697
» Exploration in Relational Worlds
Sort
View

Publication
344views
12 years 7 months ago
Top-k Similarity Join over Multi-valued Objects
The top-k similarity joins have been extensively studied and used in a wide spectrum of applications such as information retrieval, decision making, spatial data analysis and dat...
Wenjie Zhang, Jing Xu, Xin Liang, Ying Zhang, Xuem...
CODASPY
2012
12 years 4 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
IHI
2012
330views Healthcare» more  IHI 2012»
12 years 4 months ago
Health information searching behavior in MedlinePlus and the impact of tasks
Consumer health information is increasingly available online, but this vast amount of information is not necessarily accessible to general consumers. To design effective health in...
Yan Zhang, Peiling Wang, Amy Heaton, Heidi Winkler
WACV
2012
IEEE
12 years 4 months ago
Tools for richer crowd source image annotations
Crowd-sourcing tools such as Mechanical Turk are popular for annotation of large scale image data sets. Typically, these annotations consist of bounding boxes or coarse outlines o...
Joshua Little, Austin Abrams, Robert Pless
TON
2012
11 years 11 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta