Sciweavers

4529 search results - page 825 / 906
» Position Based Cryptography
Sort
View
184
Voted
GIS
2007
ACM
16 years 1 months ago
Location anonymity in continuous location-based services
A major concern for large-scale deployment of location-based services (LBSs) is the potential abuse of their client location data, which may imply sensitive personal information. ...
Toby Xu, Ying Cai
193
Voted
GIS
2006
ACM
16 years 1 months ago
Efficient position-independent iconic search using an R-theta index
An iconic image database is a collection of symbolic images where each image is a collection of labeled point features called icons. A method is presented to support fast position...
Charles Ben Cranston, Hanan Samet
102
Voted
MICCAI
2002
Springer
16 years 1 months ago
A Novel Image Similarity Measure for Registration of 3-D MR Images and X-Ray Projection Images
Most existing methods for registration of three-dimensional tomographic images to two-dimensional projection images use simulated projection images and either intensity-based or fe...
Torsten Rohlfing, Calvin R. Maurer Jr.
102
Voted
WWW
2009
ACM
16 years 1 months ago
Click chain model in web search
Given a terabyte click log, can we build an efficient and effective click model? It is commonly believed that web search click logs are a gold mine for search business, because th...
Anitha Kannan, Chao Liu 0001, Christos Faloutsos, ...
WWW
2008
ACM
16 years 1 months ago
Efficient multi-keyword search over p2p web
Current search mechanisms of DHT-based P2P systems can well handle a single keyword search problem. Other than single keyword search, multi-keyword search is quite popular and use...
Hanhua Chen, Hai Jin, Jiliang Wang, Lei Chen 0002,...