Sciweavers

8311 search results - page 1502 / 1663
» Phase-Based Information Retrieval
Sort
View
120
Voted
CSFW
2000
IEEE
15 years 7 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
150
Voted
IFIPTCS
2000
15 years 7 months ago
An Index for Two Dimensional String Matching Allowing Rotations
We present an index to search a two-dimensional pattern of size m m in a two-dimensional text of size n n, even when the pattern appears rotated in the text. The index is based on ...
Kimmo Fredriksson, Gonzalo Navarro, Esko Ukkonen
115
Voted
ECCV
2010
Springer
15 years 7 months ago
Binary coherent edge descriptors
Patch descriptors are used for a variety of tasks ranging from finding corresponding points across images, to describing object category parts. In this paper, we propose an image ...
125
Voted
WEBDB
2000
Springer
110views Database» more  WEBDB 2000»
15 years 7 months ago
Modeling Data Entry and Operations in WebML
Web Modeling Language (WebML, http://webml.org) is a notation for visually specifying complex Web sites at the conceptual level. All the concepts of WebML are specified both graph...
Aldo Bongio, Stefano Ceri, Piero Fraternali, Andre...
153
Voted
SIGMOD
1995
ACM
80views Database» more  SIGMOD 1995»
15 years 7 months ago
Join Queries with External Text Sources: Execution and Optimization Techniques
Text is a pervasive information type, and many applications require querying over text sources in addition to structured data. This paper studies the problem of query processing i...
Surajit Chaudhuri, Umeshwar Dayal, Tak W. Yan
« Prev « First page 1502 / 1663 Last » Next »