Sciweavers

4382 search results - page 539 / 877
» Query by Semantic Example
Sort
View
138
Voted
PSD
2010
Springer
167views Database» more  PSD 2010»
15 years 2 months ago
Does Differential Privacy Protect Terry Gross' Privacy?
The concept of differential privacy was motivated through the example of Terry Gross’ height in Dwork (2006). In this paper, we show that when a procedure based on differential p...
Krishnamurty Muralidhar, Rathindra Sarathy
ICIP
1999
IEEE
16 years 5 months ago
In-Picture Search Algorithm for Content-Based Image Retrieval
Researchers are currently more interested in searching for fragments that are similar to a query, than a total data item that is similar to a query; the search interest is for &qu...
Punpiti Piamsa-nga, Nikitas A. Alexandridis, Sanan...
ICDE
2005
IEEE
113views Database» more  ICDE 2005»
16 years 5 months ago
On the Optimal Ordering of Maps and Selections under Factorization
The query optimizer of a database system is confronted with two aspects when handling user-defined functions (UDFs) in query predicates: the vast differences in evaluation costs b...
Thomas Neumann, Sven Helmer, Guido Moerkotte
WWW
2006
ACM
16 years 4 months ago
A web-based kernel function for measuring the similarity of short text snippets
Determining the similarity of short text snippets, such as search queries, works poorly with traditional document similarity measures (e.g., cosine), since there are often few, if...
Mehran Sahami, Timothy D. Heilman
STOC
2007
ACM
98views Algorithms» more  STOC 2007»
16 years 4 months ago
Negative weights make adversaries stronger
The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has ap...
Peter Høyer, Troy Lee, Robert Spalek