Sciweavers

897 search results - page 58 / 180
» Identity: How to name it, How to find it
Sort
View
FC
2008
Springer
107views Cryptology» more  FC 2008»
15 years 3 months ago
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Abstract. We examine the structure and outcomes of user participation in PhishTank, a phishing-report collator. Anyone who wishes may submit URLs of suspected phishing websites, an...
Tyler Moore, Richard Clayton
PODS
2006
ACM
122views Database» more  PODS 2006»
16 years 1 months ago
Inverting schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin
CHI
2003
ACM
16 years 2 months ago
Reflowing digital ink annotations
Annotating paper documents with a pen is a familiar and indispensable activity across a wide variety of work and educational settings. Recent developments in pen-based computing p...
David Bargeron, Tomer Moscovich
VLDB
2007
ACM
107views Database» more  VLDB 2007»
16 years 1 months ago
VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams
Many applications need to solve the following problem of approximate string matching: from a collection of strings, how to find those similar to a given string, or the strings in ...
Chen Li, Bin Wang, Xiaochun Yang
ICDE
2010
IEEE
874views Database» more  ICDE 2010»
16 years 1 months ago
UV-Diagram: A Voronoi Diagram for Uncertain Data
The Voronoi diagram is an important technique for answering nearest-neighbor queries for spatial databases. In this paper, we study how the Voronoi diagram can be used on uncertain...
Reynold Cheng, Xike Xie, Man Lung Yiu, Jinchuan Ch...