Sciweavers

3210 search results - page 614 / 642
» Secure Similarity Search
Sort
View
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 5 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
IPPS
2003
IEEE
15 years 5 months ago
Transparent Query Caching in Peer-to-Peer Overlay Networks
Peer-to-peer (p2p) systems such as Gnutella and KaZaa are routinely used by millions of people for sharing music and many other files over the Internet, and they account for a si...
Sunil Patro, Y. Charlie Hu
MICRO
2003
IEEE
128views Hardware» more  MICRO 2003»
15 years 5 months ago
IPStash: a Power-Efficient Memory Architecture for IP-lookup
Abstract—High-speed routers often use commodity, fully-associative, TCAMs (Ternary Content Addressable Memories) to perform packet classification and routing (IP lookup). We prop...
Stefanos Kaxiras, Georgios Keramidas
WECWIS
2003
IEEE
132views ECommerce» more  WECWIS 2003»
15 years 5 months ago
Page Digest for Large-Scale Web Services
The rapid growth of the World Wide Web and the Internet has fueled interest in Web services and the Semantic Web, which are quickly becoming important parts of modern electronic c...
Daniel Rocco, David Buttler, Ling Liu
MM
2003
ACM
113views Multimedia» more  MM 2003»
15 years 5 months ago
R-Histogram: quantitative representation of spatial relations for similarity-based image retrieval
Representation of relative spatial relations between objects is required in many multimedia database applications. Quantitative representation of spatial relations taking into acc...
Yuhang Wang, Fillia Makedon