Sciweavers

3210 search results - page 101 / 642
» Secure Similarity Search
Sort
View
139
Voted
AAAI
2006
15 years 6 months ago
Computing Slater Rankings Using Similarities among Candidates
Voting (or rank aggregation) is a general method for aggregating the preferences of multiple agents. One important voting rule is the Slater rule. It selects a ranking of the alte...
Vincent Conitzer
ICTAI
2010
IEEE
15 years 2 months ago
A Semantic Similarity Language Model to Improve Automatic Image Annotation
In recent years, with the rapid proliferation of digital images, the need to search and retrieve the images accurately, efficiently, and conveniently is becoming more acute. Automa...
Tianxia Gong, Shimiao Li, Chew Lim Tan
CIKM
2007
Springer
15 years 11 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
145
Voted
VLDB
2001
ACM
94views Database» more  VLDB 2001»
15 years 9 months ago
FeedbackBypass: A New Approach to Interactive Similarity Query Processing
In recent years, several methods have been proposed for implementing interactive similarity queries on multimedia databases. Common to all these methods is the idea to exploit use...
Ilaria Bartolini, Paolo Ciaccia, Florian Waas
BMCBI
2008
173views more  BMCBI 2008»
15 years 5 months ago
Gene Vector Analysis (Geneva): A unified method to detect differentially-regulated gene sets and similar microarray experiments
Background: Microarray experiments measure changes in the expression of thousands of genes. The resulting lists of genes with changes in expression are then searched for biologica...
Stephen W. Tanner, Pankaj Agarwal