Sciweavers

2850 search results - page 480 / 570
» Answering Queries using Humans, Algorithms and Databases
Sort
View
110
Voted
ISWC
2002
IEEE
15 years 6 months ago
Threat Response: A Compelling Application for Wearable Computing
This paper explores the application of wearable computer systems to threat response, exemplified by the Multi-functional Micro-controllable Interface Module (MMIM)/Digital Militar...
Noa M. Rensing, Evan Weststrate, Paul M. Zavracky,...
131
Voted
WWW
2008
ACM
16 years 2 months ago
Geographic web usage estimation by monitoring DNS caches
DNS is one of the most actively used distributed databases on earth, accessed by millions of people every day to transparently convert host names into IP addresses and vice versa....
Hüseyin Akcan, Torsten Suel, Hervé Br&...
114
Voted
BTW
2007
Springer
142views Database» more  BTW 2007»
15 years 8 months ago
Getting Prime Cuts from Skylines over Partially Ordered Domains
: Skyline queries have recently received a lot of attention due to their intuitive query formulation: users can state preferences with respect to several attributes. Unlike numeric...
Wolf-Tilo Balke, Wolf Siberski, Ulrich Güntze...
133
Voted
ICIAR
2010
Springer
15 years 5 months ago
A Geometric Data Structure Applicable to Image Mining and Retrieval
Abstract. Due to improvements in image acquisition and storage technology, terabyte-sized databases of images are nowadays common. This abundance of data leads us to two basic prob...
T. Iwaszko, Mahmoud Melkemi, Lhassane Idoumghar
162
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi