Sciweavers

2850 search results - page 499 / 570
» Answering Queries using Humans, Algorithms and Databases
Sort
View
114
Voted
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
15 years 8 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...
CCS
2004
ACM
15 years 7 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
ICDE
2009
IEEE
173views Database» more  ICDE 2009»
16 years 3 months ago
Differencing Provenance in Scientific Workflows
Abstract-- Scientific workflow management systems are increaingly providing the ability to manage and query the provenance of data products. However, the problem of differencing th...
Zhuowei Bao, Sarah Cohen Boulakia, Susan B. Davids...
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
16 years 3 months ago
Maintaining Connectivity in Dynamic Multimodal Network Models
Network data models are frequently used as a mechanism to describe the connectivity between spatial features in many emerging GIS applications (location-based services, transporta...
Petko Bakalov, Erik G. Hoel, Wee-Liang Heng, Vassi...
WWW
2005
ACM
16 years 2 months ago
Duplicate detection in click streams
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi