Sciweavers

897 search results - page 58 / 180
» Identity: How to name it, How to find it
Sort
View
FC
2008
Springer
107views Cryptology» more  FC 2008»
13 years 10 months ago
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Abstract. We examine the structure and outcomes of user participation in PhishTank, a phishing-report collator. Anyone who wishes may submit URLs of suspected phishing websites, an...
Tyler Moore, Richard Clayton
PODS
2006
ACM
122views Database» more  PODS 2006»
14 years 8 months ago
Inverting schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin
CHI
2003
ACM
14 years 9 months ago
Reflowing digital ink annotations
Annotating paper documents with a pen is a familiar and indispensable activity across a wide variety of work and educational settings. Recent developments in pen-based computing p...
David Bargeron, Tomer Moscovich
VLDB
2007
ACM
107views Database» more  VLDB 2007»
14 years 9 months ago
VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams
Many applications need to solve the following problem of approximate string matching: from a collection of strings, how to find those similar to a given string, or the strings in ...
Chen Li, Bin Wang, Xiaochun Yang
ICDE
2010
IEEE
874views Database» more  ICDE 2010»
14 years 8 months ago
UV-Diagram: A Voronoi Diagram for Uncertain Data
The Voronoi diagram is an important technique for answering nearest-neighbor queries for spatial databases. In this paper, we study how the Voronoi diagram can be used on uncertain...
Reynold Cheng, Xike Xie, Man Lung Yiu, Jinchuan Ch...