Sciweavers

3210 search results - page 69 / 642
» Secure Similarity Search
Sort
View
145
Voted
ICIAP
2009
ACM
16 years 5 months ago
Nonlocal Similarity Image Filtering
Abstract. We exploit the recurrence of structures at different locations, orientations and scales in an image to perform denoising. While previous methods based on "nonlocal f...
Yifei Lou, Paolo Favaro, Stefano Soatto, Andrea L....
CCS
2010
ACM
15 years 4 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
HYPERTEXT
2009
ACM
16 years 1 months ago
A scalable, collaborative similarity measure for social annotation systems
Collaborative annotation tools are in widespread use. The metadata from these systems can be mined to induce semantic relationships among Web objects (sites, pages, tags, concepts...
Benjamin Markines, Filippo Menczer
LAWEB
2003
IEEE
15 years 10 months ago
Syntactic Similarity of Web Documents
This paper presents and compares two methods for evaluating the syntactic similarity between documents. The first method uses the Patricia tree, constructed from the original doc...
Álvaro R. Pereira Jr., Nivio Ziviani
CIKM
2009
Springer
15 years 11 months ago
On domain similarity and effectiveness of adapting-to-rank
Adapting to rank address the the problem of insufficient domainspecific labeled training data in learning to rank. However, the initial study shows that adaptation is not always...
Keke Chen, Jing Bai, Srihari Reddy, Belle L. Tseng