Sciweavers

3210 search results - page 73 / 642
» Secure Similarity Search
Sort
View
118
Voted
AMR
2005
Springer
88views Multimedia» more  AMR 2005»
15 years 10 months ago
Context-Based Image Similarity Queries
Abstract. In this paper an effective context-based approach for interactive similarity queries is presented. By exploiting the notion of image “context”, it is possible to asso...
Ilaria Bartolini
EWCBR
2004
Springer
15 years 10 months ago
Exploiting Background Knowledge when Learning Similarity Measures
The definition of similarity measures—one core component of every CBR application—leads to a serious knowledge acquisition problem if domain and application specific requirem...
Thomas Gabel, Armin Stahl
123
Voted
WWW
2008
ACM
16 years 5 months ago
Reasoning about similarity queries in text retrieval tasks
In many text retrieval tasks, it is highly desirable to obtain a "similarity profile" of the document collection for a given query. We propose sampling-based techniques ...
Xiaohui Yu, Yang Liu
COCOON
2005
Springer
15 years 10 months ago
A Quadratic Lower Bound for Rocchio's Similarity-Based Relevance Feedback Algorithm
Rocchio’s similarity-based relevance feedback algorithm, one of the most important query reformation methods in information retrieval, is essentially an adaptive supervised lear...
Zhixiang Chen, Bin Fu
TC
1998
15 years 4 months ago
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP
Abstract—A widely used bus-encryption microprocessor is vulnerable to a new practical attack. This type of processor decrypts onthe-fly while fetching code and data, which are st...
Markus G. Kuhn