We present an architecture and a set of challenges for peer database management systems. These systems team up to build a network of nodes (peers) that coordinate at run time most...
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Web image search using text queries has received considerable attention. However, current state-of-the-art approaches require training models for every new query, and are therefore...
Josip Krapac, Moray Allan, Jakob Verbeek, Frédér...
With increasing popularity of using ontologies, many industrial and clinical applications have employed ontologies as their conceptual backbone. Ontologies try to capture knowledge...