Sciweavers

1168 search results - page 158 / 234
» Personalized search
Sort
View
WWW
2010
ACM
14 years 3 months ago
Towards comment-based cross-media retrieval
This paper investigates whether Web comments can be exploited for cross-media retrieval. Comparing Web items such as texts, images, videos, music, products, or personal profiles ...
Martin Potthast, Benno Stein, Steffen Becker
CSE
2009
IEEE
14 years 3 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
ADHOCNETS
2009
Springer
14 years 3 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
WEBDB
2009
Springer
159views Database» more  WEBDB 2009»
14 years 3 months ago
Beyond the Stars: Improving Rating Predictions using Review Text Content
Online reviews are an important asset for users deciding to buy a product, see a movie, or go to a restaurant, as well as for businesses tracking user feedback. However, most revi...
Gayatree Ganu, Noemie Elhadad, Amélie Maria...
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 3 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson