Sciweavers

3210 search results - page 104 / 642
» Secure Similarity Search
Sort
View
RIVF
2007
15 years 6 months ago
Disambiguation of People in Web Search Using a Knowledge Base
— Results of queries by personal names often contain documents related to several people because of the namesake problem. In order to differentiate documents related to different...
Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, J...
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 9 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
122
Voted
ESWS
2008
Springer
15 years 6 months ago
Concept Search: Semantics Enabled Syntactic Search
Abstract. Historically, information retrieval (IR) has followed two principally different paths that we call syntactic IR and semantic IR. In syntactic IR, terms are represented as...
Fausto Giunchiglia, Uladzimir Kharkevich, Ilya Zai...
CVPR
2011
IEEE
14 years 8 months ago
Compact Hashing with Joint Optimization of Search Accuracy and Time
Similarity search, namely, finding approximate nearest neighborhoods, is the core of many large scale machine learning or vision applications. Recently, many research results dem...
Junfeng He, Regunathan Radhakrishnan, Shih-Fu Chan...
CF
2008
ACM
15 years 7 months ago
Exact multi-pattern string matching on the cell/b.e. processor
String searching is the computationally intensive kernel of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filter...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...