Sciweavers

3210 search results - page 595 / 642
» Secure Similarity Search
Sort
View
ASIACRYPT
2011
Springer
13 years 11 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
DOCENG
2011
ACM
13 years 11 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...
ICCV
2007
IEEE
16 years 1 months ago
Game-Theoretic Multiple Target Tracking
Video-based multiple target tracking (MTT) is a challenging task when similar targets are present in close vicinity. Because their visual observations are mixed and difficult to s...
Ming Yang, Ting Yu, Ying Wu
ICDE
2009
IEEE
251views Database» more  ICDE 2009»
16 years 1 months ago
Contextual Ranking of Keywords Using Click Data
The problem of automatically extracting the most interesting and relevant keyword phrases in a document has been studied extensively as it is crucial for a number of applications. ...
Utku Irmak, Vadim von Brzeski, Reiner Kraft
ICDE
2008
IEEE
112views Database» more  ICDE 2008»
16 years 1 months ago
XML Index Recommendation with Tight Optimizer Coupling
XML database systems are expected to handle increasingly complex queries over increasingly large and highly structured XML databases. An important problem that needs to be solved ...
Iman Elghandour, Ashraf Aboulnaga, Daniel C. Zilio...