Sciweavers

3657 search results - page 664 / 732
» A Study of Practical Deduplication
Sort
View
SOUPS
2006
ACM
15 years 3 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
77
Voted
ICDM
2005
IEEE
166views Data Mining» more  ICDM 2005»
15 years 3 months ago
An Algorithm for In-Core Frequent Itemset Mining on Streaming Data
Frequent itemset mining is a core data mining operation and has been extensively studied over the last decade. This paper takes a new approach for this problem and makes two major...
Ruoming Jin, Gagan Agrawal
INFOCOM
2005
IEEE
15 years 3 months ago
Improved single-round protocols for remote file synchronization
— Given two versions of a file, a current version located on one machine and an outdated version known only to another machine, the remote file synchronization problem is how t...
Utku Irmak, Svilen Mihaylov, Torsten Suel
MIR
2005
ACM
137views Multimedia» more  MIR 2005»
15 years 3 months ago
A content-based image retrieval system for fish taxonomy
It is estimated that less than ten percent of the world’s species have been discovered and described. The main reason for the slow pace of new species description is that the sc...
Yixin Chen, Henry L. Bart Jr., Fei Teng
SAC
2005
ACM
15 years 3 months ago
A complex biological database querying method
Many biological information systems rely on relational database management systems (RDBMS) to manage high-throughput biological data. While keeping these data well archived, organ...
Jake Yue Chen, John V. Carlis, Ning Gao