Sciweavers

1168 search results - page 158 / 234
» Personalized search
Sort
View
WWW
2010
ACM
15 years 11 months ago
Towards comment-based cross-media retrieval
This paper investigates whether Web comments can be exploited for cross-media retrieval. Comparing Web items such as texts, images, videos, music, products, or personal profiles ...
Martin Potthast, Benno Stein, Steffen Becker
CSE
2009
IEEE
15 years 10 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
ADHOCNETS
2009
Springer
15 years 10 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
WEBDB
2009
Springer
159views Database» more  WEBDB 2009»
15 years 10 months ago
Beyond the Stars: Improving Rating Predictions using Review Text Content
Online reviews are an important asset for users deciding to buy a product, see a movie, or go to a restaurant, as well as for businesses tracking user feedback. However, most revi...
Gayatree Ganu, Noemie Elhadad, Amélie Maria...
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 10 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson