Sciweavers

3210 search results - page 552 / 642
» Secure Similarity Search
Sort
View
JCDL
2011
ACM
374views Education» more  JCDL 2011»
14 years 8 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
TOG
2012
279views Communications» more  TOG 2012»
13 years 7 months ago
Sketch-based shape retrieval
We develop a system for 3D object retrieval based on sketched feature lines as input. For objective evaluation, we collect a large number of query sketches from human users that a...
Mathias Eitz, Ronald Richter, Tamy Boubekeur, Kris...
CVPR
2012
IEEE
13 years 7 months ago
Robust visual tracking using autoregressive hidden Markov Model
Recent studies on visual tracking have shown significant improvement in accuracy by handling the appearance variations of the target object. Whereas most studies present schemes ...
Dong Woo Park, Junseok Kwon, Kyoung Mu Lee
TKDE
2012
212views Formal Methods» more  TKDE 2012»
13 years 7 months ago
Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
—Moving Object Databases (MOD), although ubiquitous, still call for methods that will be able to understand, search, analyze, and browse their spatiotemporal content. In this pap...
Costas Panagiotakis, Nikos Pelekis, Ioannis Kopana...
TCC
2007
Springer
100views Cryptology» more  TCC 2007»
15 years 11 months ago
Private Approximation of Clustering and Vertex Cover
Private approximation of search problems deals with finding approximate solutions to search problems while disclosing as little information as possible. The focus of this work is ...
Amos Beimel, Renen Hallak, Kobbi Nissim