Sciweavers

2853 search results - page 505 / 571
» On the Efficiency of Provenance Queries
Sort
View
MM
2006
ACM
164views Multimedia» more  MM 2006»
15 years 5 months ago
Scalable relevance feedback using click-through data for web image retrieval
Relevance feedback (RF) has been extensively studied in the content-based image retrieval community. However, no commercial Web image search engines support RF because of scalabil...
En Cheng, Feng Jing, Lei Zhang, Hai Jin
DSN
2005
IEEE
15 years 5 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ITCC
2005
IEEE
15 years 5 months ago
NIPPERS: Network of InterPolated PeERS for Web Service Discovery
Web services are becoming an important enabler of the Semantic Web. Besides the need for a rich description mechanism, Web Service information should be made available in an acces...
Christos Makris, Evangelos Sakkopoulos, Spyros Sio...
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy
SSDBM
2005
IEEE
128views Database» more  SSDBM 2005»
15 years 5 months ago
Fuzzy Decomposition of Spatially Extended Objects
Modern database applications including computer-aided design, multimedia information systems, medical imaging, molecular biology, or geographical information systems impose new re...
Hans-Peter Kriegel, Martin Pfeifle