Sciweavers

1860 search results - page 197 / 372
» Jiro Storage Management
Sort
View
CLEF
2006
Springer
15 years 8 months ago
GeoCLEF Text Retrieval and Manual Expansion Approaches
In this paper we will describe the Berkeley approaches to the GeoCLEF tasks for CLEF 2006. This year we used two separate systems for different tasks. Although of the systems both...
Ray R. Larson, Fredric C. Gey
KES
2000
Springer
15 years 8 months ago
Extracting geometric models from medieval moulding profiles for case-based reasoning
Cross-sectional pmfiles of medieval mouldings are often considered to be a vital form of data to Art Historians. Mouldings were often used to highlight salient areas of buildings,...
Gareth Bradshaw, Carol O'Sullivan
ISW
1997
Springer
15 years 8 months ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng
PODS
1989
ACM
155views Database» more  PODS 1989»
15 years 8 months ago
Fractals for Secondary Key Retrieval
In this paper we propose the use of fractals and especially the Hilbert curve, in order to design good distance-preserving mappings. Such mappings improve the performance of secon...
Christos Faloutsos, Shari Roseman
EDBT
2010
ACM
123views Database» more  EDBT 2010»
15 years 8 months ago
Lost source provenance
As the use of derived information has grown in recent years, the importance of provenance has been recognized, and there has been a great deal of effort devoted to developing tec...
Jing Zhang, H. V. Jagadish