Sciweavers

476 search results - page 16 / 96
» Algorithm, Implementation and Application of the SIM-DL Simi...
Sort
View
SIGMOD
2010
ACM
228views Database» more  SIGMOD 2010»
15 years 4 months ago
Probabilistic string similarity joins
Edit distance based string similarity join is a fundamental operator in string databases. Increasingly, many applications in data cleaning, data integration, and scientific compu...
Jeffrey Jestes, Feifei Li, Zhepeng Yan, Ke Yi
TSE
2010
230views more  TSE 2010»
14 years 6 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
ICDE
2011
IEEE
224views Database» more  ICDE 2011»
14 years 3 months ago
SmartTrace: Finding similar trajectories in smartphone networks without disclosing the traces
—In this demonstration paper, we present a powerful distributed framework for finding similar trajectories in a smartphone network, without disclosing the traces of participatin...
Costandinos Costa, Christos Laoudias, Demetrios Ze...
ICMCS
2007
IEEE
255views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Distributed Architecture for Large Scale Image-Based Search
In recent years, some computer vision algorithms such as SIFT (Scale Invariant Feature Transform) have been employed in image similarity match to perform image-based search applic...
Yu Zheng, Xing Xie, Wei-Ying Ma
81
Voted
FPL
2006
Springer
98views Hardware» more  FPL 2006»
15 years 3 months ago
Self-Reconfigurable Pervasive Platform for Cryptographic Application
The complexity exhibited by pervasive systems is constantly increasing. Customer electronics devices provide day to day a larger amount of functionalities. A common approach for g...
Arnaud Lagger, Andres Upegui, Eduardo Sanchez, Iva...