Sciweavers

1618 search results - page 290 / 324
» Score Distributions in Information Retrieval
Sort
View
NDSS
2002
IEEE
14 years 1 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
ICDAR
1999
IEEE
14 years 24 days ago
Preattentive Reading and Selective Attention for Document Image Analysis
PixED (from Pixel to Electronic Document) is aimed at converting document images into structured electronic documents which can be read by a machine for information retrieval. The...
Claudie Faure
SIGMOD
1995
ACM
80views Database» more  SIGMOD 1995»
14 years 1 days ago
Join Queries with External Text Sources: Execution and Optimization Techniques
Text is a pervasive information type, and many applications require querying over text sources in addition to structured data. This paper studies the problem of query processing i...
Surajit Chaudhuri, Umeshwar Dayal, Tak W. Yan
CONEXT
2008
ACM
13 years 10 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
IAT
2007
IEEE
13 years 10 months ago
Resource-Aware Update Policy for Highly Dynamic P2P Networks
As a user attention has become a precious resource, a special care has to be taken to reduce the time needed for answering queries in P2P networks. Existing solutions are usually ...
Dragan Milosevic, Jérôme Kunegis, Sah...