Sciweavers

1456 search results - page 205 / 292
» Keeping encountered information
Sort
View
FOCS
2006
IEEE
15 years 6 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
IPPS
2006
IEEE
15 years 6 months ago
D1HT: a distributed one hop hash table
Distributed Hash Tables (DHTs) have been used in a variety of applications, but most DHTs so far have opted to solve lookups with multiple hops, which sacrifices performance in o...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
JCDL
2006
ACM
137views Education» more  JCDL 2006»
15 years 5 months ago
Exploring digital libraries: integrating browsing, searching, and visualization
Exploring services for digital libraries (DLs) include two major paradigms, browsing and searching, as well as other services such as clustering and visualization. In this paper, ...
Rao Shen, Naga Srinivas Vemuri, Weiguo Fan, Ricard...
MM
2006
ACM
148views Multimedia» more  MM 2006»
15 years 5 months ago
Audio similarity measure by graph modeling and matching
This paper proposes a new approach for the similarity measure and ranking of audio clips by graph modeling and matching. Instead of using frame-based or salient-based features to ...
Yuxin Peng, Chong-Wah Ngo, Cuihua Fang, Xiaoou Che...
MSR
2006
ACM
15 years 5 months ago
Where is bug resolution knowledge stored?
ArgoUML uses both CVS and Bugzilla to keep track of bugfixing activities since 1998. A common practice is to reference source code changes resolving a bug stored in Bugzilla by i...
Gerardo Canfora, Luigi Cerulo