Sciweavers

1175 search results - page 220 / 235
» Querying by examples
Sort
View
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
14 years 1 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
JCDL
2004
ACM
198views Education» more  JCDL 2004»
14 years 29 days ago
Finding authoritative people from the web
Today’s web is so huge and diverse that it arguably reflects the real world. For this reason, searching the web is a promising approach to find things in the real world. This ...
Masanori Harada, Shin-ya Sato, Kazuhiro Kazama
MM
2004
ACM
195views Multimedia» more  MM 2004»
14 years 29 days ago
Hierarchical clustering of WWW image search results using visual, textual and link information
We consider the problem of clustering Web image search results. Generally, the image search results returned by an image search engine contain multiple topics. Organizing the resu...
Deng Cai, Xiaofei He, Zhiwei Li, Wei-Ying Ma, Ji-R...
MM
2004
ACM
170views Multimedia» more  MM 2004»
14 years 29 days ago
Effective automatic image annotation via a coherent language model and active learning
Image annotations allow users to access a large image database with textual queries. There have been several studies on automatic image annotation utilizing machine learning techn...
Rong Jin, Joyce Y. Chai, Luo Si
ECOOP
2004
Springer
14 years 27 days ago
Finding and Removing Performance Bottlenecks in Large Systems
Abstract. Software systems obey the 80/20 rule: aggressively optimizing a vital few execution paths yields large speedups. However, finding the vital few paths can be difficult, e...
Glenn Ammons, Jong-Deok Choi, Manish Gupta, Nikhil...