Sciweavers

242 search results - page 23 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
EDBT
2010
ACM
155views Database» more  EDBT 2010»
15 years 24 days ago
Suffix tree construction algorithms on modern hardware
Suffix trees are indexing structures that enhance the performance of numerous string processing algorithms. In this paper, we propose cache-conscious suffix tree construction algo...
Dimitris Tsirogiannis, Nick Koudas
CLEF
2007
Springer
15 years 3 months ago
Speeding Up IDM without Degradation of Retrieval Quality
The Image Distortion Model (IDM) has shown good retrieval quality in previous runs of the medical automatic annotation task of previous ImageCLEF workshops. However, one of its li...
Michael Springmann, Heiko Schuldt
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Retrieval of 3D objects using curvature correlograms
Along with images and videos, 3D models have raised a certain interest for a number of reasons, including advancements in 3D hardware and software technologies, their ever decreas...
Gianni Antini, Stefano Berretti, Alberto Del Bimbo...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 1 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
NDQA
2003
119views Education» more  NDQA 2003»
14 years 11 months ago
Inference Web: Portable and Sharable Explanations for Question Answering
The World Wide Web lacks support for explaining information provenance. When web applications return results, many users do not know what information sources were used, when they ...
Deborah L. McGuinness, Paulo Pinheiro da Silva