Sciweavers

915 search results - page 170 / 183
» Proof labeling schemes
Sort
View
MM
2004
ACM
129views Multimedia» more  MM 2004»
14 years 1 months ago
A novel log-based relevance feedback technique in content-based image retrieval
Relevance feedback has been proposed as an important technique to boost the retrieval performance in content-based image retrieval (CBIR). However, since there exists a semantic g...
Chu-Hong Hoi, Michael R. Lyu
INFOCOM
2000
IEEE
14 years 20 days ago
Rainbow Fair Queueing: Fair Bandwidth Sharing Without Per-Flow State
Abstract—Fair bandwidth sharing at routers has several advantages, including protection of well-behaved flows and possible simplification of endto-end congestion control mechan...
Zhiruo Cao, Zheng Wang, Ellen W. Zegura
AUSDM
2006
Springer
144views Data Mining» more  AUSDM 2006»
14 years 17 hour ago
A Characterization of Wordnet Features in Boolean Models For Text Classification
Supervised text classification is the task of automatically assigning a category label to a previously unlabeled text document. We start with a collection of pre-labeled examples ...
Trevor N. Mansuy, Robert J. Hilderman
ESORICS
2009
Springer
14 years 9 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
TCC
2009
Springer
142views Cryptology» more  TCC 2009»
14 years 8 months ago
Chosen-Ciphertext Security via Correlated Products
We initiate the study of one-wayness under correlated products. We are interested in identifying necessary and sufficient conditions for a function f and a distribution on inputs ...
Alon Rosen, Gil Segev