Sciweavers

469 search results - page 74 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
109
Voted
BMCBI
2010
164views more  BMCBI 2010»
15 years 2 months ago
Pan-genome sequence analysis using Panseq: an online tool for the rapid analysis of core and accessory genomic regions
Background: The pan-genome of a bacterial species consists of a core and an accessory gene pool. The accessory genome is thought to be an important source of genetic variability i...
Chad Laing, Cody Buchanan, Eduardo N. Taboada, Yon...
138
Voted
COLING
2010
14 years 9 months ago
Cloud Computing for Linguists
The system presented is a web application designed to aid linguistic research with data collection and online publishing. It is a service mainly for linguists and language experts...
Dorothee Beermann, Pavel Mihaylov
95
Voted
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 5 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
CVPR
2009
IEEE
16 years 9 months ago
Tour the World: building a web-scale landmark recognition engine
Modeling and recognizing landmarks at world-scale is a useful yet challenging task. There exists no readily available list of worldwide landmarks. Obtaining reliable visual mode...
Yantao Zheng, Ming Zhao 0003, Yang Song, Hartwig A...
213
Voted
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
16 years 2 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...