Sciweavers

3210 search results - page 117 / 642
» Secure Similarity Search
Sort
View
151
Voted
CCS
2011
ACM
14 years 5 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
NTMS
2008
IEEE
15 years 11 months ago
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securi...
Hani Alzaid, Manal Alfaraj
ICIP
2004
IEEE
16 years 6 months ago
Short/long-term motion vector prediction in multi-frame video coding system
Multi-frame motion estimation is a novel technique to improve the video coding efficiency. However, the computational complexity in motion search is usually a bottleneck in the vi...
Yi-Hon Hsiao, Tien-Hsu Lee, Pao-Chi Chang
WEBNET
2001
15 years 6 months ago
Deriving Context Specific Information on the Web
: The Web is huge, unstructured and diverse in quality, which makes searching for information difficult. In practice, few of the documents returned by a search engine are valuable ...
Christo Dichev, Darina Dicheva
132
Voted
WWW
2003
ACM
16 years 5 months ago
Query-free news search
Many daily activities present information in the form of a stream of text, and often people can benefit from additional information on the topic discussed. TV broadcast news can b...
Monika Rauch Henzinger, Bay-Wei Chang, Brian Milch...