Sciweavers

6103 search results - page 1187 / 1221
» Multimedia Retrieval Algorithmics
Sort
View
SIGIR
2009
ACM
14 years 2 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...
BIBM
2008
IEEE
217views Bioinformatics» more  BIBM 2008»
14 years 2 months ago
Combining Hierarchical Inference in Ontologies with Heterogeneous Data Sources Improves Gene Function Prediction
The study of gene function is critical in various genomic and proteomic fields. Due to the availability of tremendous amounts of different types of protein data, integrating thes...
Xiaoyu Jiang, Naoki Nariai, Martin Steffen, Simon ...
HOST
2008
IEEE
14 years 2 months ago
Place-and-Route Impact on the Security of DPL Designs in FPGAs
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Dange...
NDSS
2008
IEEE
14 years 2 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
AIRWEB
2007
Springer
14 years 2 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
« Prev « First page 1187 / 1221 Last » Next »