Sciweavers

70 search results - page 13 / 14
» Exploiting the Annotation Practice for Personal and Collecti...
Sort
View
EDBT
2012
ACM
246views Database» more  EDBT 2012»
11 years 7 months ago
"Cut me some slack": latency-aware live migration for databases
Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. I...
Sean Kenneth Barker, Yun Chi, Hyun Jin Moon, Hakan...
BMCBI
2010
175views more  BMCBI 2010»
13 years 5 months ago
Saliva Ontology: An ontology-based framework for a Salivaomics Knowledge Base
Background: The Salivaomics Knowledge Base (SKB) is designed to serve as a computational infrastructure that can permit global exploration and utilization of data and information ...
Jiye Ai, Barry Smith, Wong T. David
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
13 years 11 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...
GIS
2010
ACM
13 years 3 months ago
Automatic construction and multi-level visualization of semantic trajectories
With the prevalence of GPS-embedded mobile devices, enormous amounts of mobility data are being collected in the form of trajectory - a stream of (x,y,t) points. Such trajectories...
Zhixian Yan, Lazar Spremic, Dipanjan Chakraborty, ...
IEEECIT
2010
IEEE
13 years 3 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi