Sciweavers

6660 search results - page 1215 / 1332
» Data Analysis for Query Processing
Sort
View
114
Voted
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
16 years 2 months ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu
MM
2006
ACM
108views Multimedia» more  MM 2006»
15 years 8 months ago
Video search reranking via information bottleneck principle
We propose a novel and generic video/image reranking algorithm, IB reranking, which reorders results from text-only searches by discovering the salient visual patterns of relevant...
Winston H. Hsu, Lyndon S. Kennedy, Shih-Fu Chang
SIGIR
2010
ACM
15 years 6 months ago
Self-taught hashing for fast similarity search
The ability of fast similarity search at large scale is of great importance to many Information Retrieval (IR) applications. A promising way to accelerate similarity search is sem...
Dell Zhang, Jun Wang, Deng Cai, Jinsong Lu
BMCBI
2010
161views more  BMCBI 2010»
15 years 2 months ago
GATExplorer: Genomic and Transcriptomic Explorer; mapping expression probes to gene loci, transcripts, exons and ncRNAs
Background: Genome-wide expression studies have developed exponentially in recent years as a result of extensive use of microarray technology. However, expression signals are typi...
Alberto Risueño, Celia Fontanillo, Marcel E...
119
Voted
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 2 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
« Prev « First page 1215 / 1332 Last » Next »