Sciweavers

1526 search results - page 239 / 306
» Low-cost and robust evaluation of information retrieval syst...
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 7 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
16 years 2 months ago
Query Planning with Limited Source Capabilities
In information-integration systems, sources may have diverse and limited query capabilities. In this paper we show that because sources have restrictions on retrieving their infor...
Chen Li, Edward Y. Chang
ICSE
2004
IEEE-ACM
16 years 1 months ago
SNIAFL: Towards a Static Non-Interactive Approach to Feature Location
To facilitate software maintenance and evolution, a helpful step is to locate features concerned in a particular maintenance task. In the literature, both dynamic and interactive ...
Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yan...
HSNMC
2004
Springer
125views Multimedia» more  HSNMC 2004»
15 years 6 months ago
Design and Implementation of a Semantic Peer-to-Peer Network
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for large-scale information retrieval and search systems due to scalability, fault-tolera...
Kiyohide Nakauchi, Hiroyuki Morikawa, Tomonori Aoy...
SAC
2002
ACM
15 years 1 months ago
Hierarchical presentation of expansion terms
Different presentations of candidate expansion terms have not been fully explored in interactive query expansion (IQE). Most existing systems that offer an IQE facility use a list...
Hideo Joho, Claire Coverson, Mark Sanderson, Miche...