Sciweavers

3210 search results - page 131 / 642
» Secure Similarity Search
Sort
View
CIKM
2010
Springer
15 years 3 months ago
Visual-semantic graphs: using queries to reduce the semantic gap in web image retrieval
We explore the application of a graph representation to model similarity relationships that exist among images found on the Web. The resulting similarity-induced graph allows us t...
Barbara Poblete, Benjamin Bustos, Marcelo Mendoza,...
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
The Collision Security of Tandem-DM in the Ideal Cipher Model
We prove that Tandem-DM, one of the two “classical” schemes for turning a blockcipher of 2n-bit key into a double block length hash function, has birthday-type collision resist...
Jooyoung Lee, Martijn Stam, John P. Steinberger
ISM
2008
IEEE
127views Multimedia» more  ISM 2008»
15 years 11 months ago
LeeDeo: Web-Crawled Academic Video Search Engine
We present our vision and preliminary design toward web-crawled academic video search engine, named as LeeDeo, that can search, crawl, archive, index, and browse “academic” vi...
Dongwon Lee, Hung-sik Kim, Eun Kyung Kim, Su Yan, ...
144
Voted
SIGIR
2008
ACM
15 years 5 months ago
Algorithmic mediation for collaborative exploratory search
We describe a new approach to information retrieval: algorithmic mediation for intentional, synchronous collaborative exploratory search. Using our system, two or more users with ...
Jeremy Pickens, Gene Golovchinsky, Chirag Shah, Pe...
IADIS
2003
15 years 6 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire