Sciweavers

1656 search results - page 293 / 332
» Labeling Schemes with Queries
Sort
View
WWW
2011
ACM
13 years 2 months ago
Here, there, and everywhere: correlated online behaviors can lead to overestimates of the effects of advertising
Measuring the causal effects of online advertising (adfx) on user behavior is important to the health of the WWW publishing industry. In this paper, using three controlled experi...
Randall A. Lewis, Justin M. Rao, David H. Reiley
CVPR
2009
IEEE
1289views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Bundling Features for Large Scale Partial-Duplicate Web Image Search
In state-of-the-art image retrieval systems, an image is represented by a bag of visual words obtained by quantizing high-dimensional local image descriptors, and scalable schem...
Zhong Wu (Tsinghua University), Qifa Ke (Microsoft...
ICDE
2006
IEEE
193views Database» more  ICDE 2006»
14 years 9 months ago
Probabilistic Message Passing in Peer Data Management Systems
Until recently, most data integration techniques involved central components, e.g., global schemas, to enable transparent access to heterogeneous databases. Today, however, with t...
Philippe Cudré-Mauroux, Karl Aberer, Andras...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 8 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
MOBIHOC
2005
ACM
14 years 7 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao