Sciweavers

8298 search results - page 1527 / 1660
» Amharic-English Information Retrieval
Sort
View
103
Voted
CSFW
2000
IEEE
15 years 5 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
IFIPTCS
2000
15 years 5 months ago
An Index for Two Dimensional String Matching Allowing Rotations
We present an index to search a two-dimensional pattern of size m m in a two-dimensional text of size n n, even when the pattern appears rotated in the text. The index is based on ...
Kimmo Fredriksson, Gonzalo Navarro, Esko Ukkonen
ECCV
2010
Springer
15 years 5 months ago
Binary coherent edge descriptors
Patch descriptors are used for a variety of tasks ranging from finding corresponding points across images, to describing object category parts. In this paper, we propose an image ...
WEBDB
2000
Springer
110views Database» more  WEBDB 2000»
15 years 5 months ago
Modeling Data Entry and Operations in WebML
Web Modeling Language (WebML, http://webml.org) is a notation for visually specifying complex Web sites at the conceptual level. All the concepts of WebML are specified both graph...
Aldo Bongio, Stefano Ceri, Piero Fraternali, Andre...
SIGMOD
1995
ACM
80views Database» more  SIGMOD 1995»
15 years 5 months ago
Join Queries with External Text Sources: Execution and Optimization Techniques
Text is a pervasive information type, and many applications require querying over text sources in addition to structured data. This paper studies the problem of query processing i...
Surajit Chaudhuri, Umeshwar Dayal, Tak W. Yan
« Prev « First page 1527 / 1660 Last » Next »