Sciweavers

3905 search results - page 389 / 781
» Teaching Design Patterns
Sort
View
NDSS
2008
IEEE
15 years 11 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
189
Voted
VIP
2003
15 years 6 months ago
Using Dual Cascading Learning Frameworks for Image Indexing
To bridge the semantic gap in content-based image retrieval, detecting meaningful visual entities (e.g. faces, sky, foliage, buildings etc) in image content and classifying images...
Joo-Hwee Lim, Jesse S. Jin
BMCBI
2005
117views more  BMCBI 2005»
15 years 4 months ago
Differentiation of regions with atypical oligonucleotide composition in bacterial genomes
Background: Complete sequencing of bacterial genomes has become a common technique of present day microbiology. Thereafter, data mining in the complete sequence is an essential st...
Oleg N. Reva, Burkhard Tümmler
IPCCC
2007
IEEE
15 years 11 months ago
Workload Characterization for News-on-Demand Streaming Services
This paper focuses on design issues for multimedia distribution architectures and the impact workload characteristics have on architecture design. Our contribution is an analysis ...
Frank T. Johnsen, Trude Hafsoe, Carsten Griwodz, P...
CSE
2009
IEEE
15 years 9 months ago
Privacy-Enhanced Event Scheduling
—Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper disting...
Benjamin Kellermann, Rainer Böhme