Sciweavers

540 search results - page 103 / 108
» Efficient Similarity Search for Hierarchical Data in Large D...
Sort
View
CCS
2005
ACM
15 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
15 years 10 months ago
De-duping URLs via rewrite rules
A large fraction of the URLs on the web contain duplicate (or near-duplicate) content. De-duping URLs is an extremely important problem for search engines, since all the principal...
Anirban Dasgupta, Ravi Kumar, Amit Sasturkar
RITA
2006
302views more  RITA 2006»
14 years 9 months ago
Content-Based Image Retrieval: Theory and Applications
: Advances in data storage and image acquisition technologies have enabled the creation of large image datasets. In this scenario, it is necessary to develop appropriate informatio...
Ricardo da Silva Torres, Alexandre X. Falcã...
110
Voted
SIGIR
2008
ACM
14 years 9 months ago
Learning to reduce the semantic gap in web image retrieval and annotation
We study in this paper the problem of bridging the semantic gap between low-level image features and high-level semantic concepts, which is the key hindrance in content-based imag...
Changhu Wang, Lei Zhang 0001, Hong-Jiang Zhang
ICDE
2008
IEEE
112views Database» more  ICDE 2008»
15 years 11 months ago
XML Index Recommendation with Tight Optimizer Coupling
XML database systems are expected to handle increasingly complex queries over increasingly large and highly structured XML databases. An important problem that needs to be solved ...
Iman Elghandour, Ashraf Aboulnaga, Daniel C. Zilio...