Sciweavers

3735 search results - page 681 / 747
» Order compression schemes
Sort
View
WIDM
2005
ACM
15 years 6 months ago
Exploiting native XML indexing techniques for XML retrieval in relational database systems
In XML retrieval, two distinct approaches have been established and pursued without much cross-fertilization taking place so far. On the one hand, native XML databases tailored to...
Felix Weigel, Klaus U. Schulz, Holger Meuss
89
Voted
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
103
Voted
ICALP
2005
Springer
15 years 6 months ago
New Approaches for Virtual Private Network Design
Virtual Private Network Design is the following NP-hard problem. We are given a communication network, represented as a weighted graph with thresholds on the nodes which represent...
Friedrich Eisenbrand, Fabrizio Grandoni, Gianpaolo...
101
Voted
MM
2004
ACM
129views Multimedia» more  MM 2004»
15 years 6 months ago
A novel log-based relevance feedback technique in content-based image retrieval
Relevance feedback has been proposed as an important technique to boost the retrieval performance in content-based image retrieval (CBIR). However, since there exists a semantic g...
Chu-Hong Hoi, Michael R. Lyu
W2GIS
2004
Springer
15 years 5 months ago
A Progressive Reprocessing Transaction Model for Updating Spatial Data in Mobile Computing Environments
Mobile transactions for updating spatial data are long-lived transactions that update local copies of the mobile platforms on disconnection. Since a mobile transaction is physicall...
Donghyun Kim, Bonghee Hong