Sciweavers

1419 search results - page 282 / 284
» Order Retrieval
Sort
View
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 4 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
PAMI
2010
147views more  PAMI 2010»
13 years 4 months ago
The Groupwise Medial Axis Transform for Fuzzy Skeletonization and Pruning
—Medial representations of shapes are useful due to their use of an object-centered coordinate system that directly captures intuitive notions of shape such as thickness, bending...
Aaron D. Ward, Ghassan Hamarneh
SISAP
2010
IEEE
135views Data Mining» more  SISAP 2010»
13 years 4 months ago
Improving the similarity search of tandem mass spectra using metric access methods
In biological applications, the tandem mass spectrometry is a widely used method for determining protein and peptide sequences from an ”in vitro” sample. The sequences are not...
Jiri Novák, Tomás Skopal, David Hoks...
ASIACRYPT
2010
Springer
13 years 4 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
CLEF
2009
Springer
13 years 4 months ago
Exploiting Speech Recognition Transcripts for Narrative Peak Detection in Short-Form Documentaries
Narrative peaks are points at which the viewer perceives a spike in the level of dramatic tension within the narrative flow of a video. This paper reports on four approaches to na...
Martha Larson, Bart Jochems, Ewine Smits, Roeland ...