Sciweavers

129 search results - page 9 / 26
» Activity-centred Search in Email
Sort
View
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
15 years 5 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher
ACSC
2000
IEEE
15 years 4 months ago
Needles and Haystacks: A Search Engine for Personal Information Collections
Information retrieval systems can be partitioned into two main classes: large-scale systems that make use of an inverted index or some other auxiliary data structure, intended for...
Owen de Kretser, Alistair Moffat
CEAS
2006
Springer
15 years 3 months ago
Introducing the Webb Spam Corpus: Using Email Spam to Identify Web Spam Automatically
Just as email spam has negatively impacted the user messaging experience, the rise of Web spam is threatening to severely degrade the quality of information on the World Wide Web....
Steve Webb, James Caverlee, Calton Pu
PODS
1998
ACM
86views Database» more  PODS 1998»
15 years 4 months ago
Efficient Searching with Linear Constraints
An extended abstract of this paper appeared in Proceedings of the 15th ACM SIGACT-SIGMODSIGART Symposium on Principles of Database Systems [1]. 2 E-mail: pankaÄcs.duke.edu; httpÂ...
Pankaj K. Agarwal, Lars Arge, Jeff Erickson, Paolo...
ICMI
2009
Springer
146views Biometrics» more  ICMI 2009»
15 years 6 months ago
A multimedia retrieval system using speech input
The AMIDA Automatic Content Linking Device (ACLD) monitors a conversation using automatic speech recognition (ASR), and uses the detected words to retrieve documents that are of p...
Andrei Popescu-Belis, Peter Poller, Jonathan Kilgo...