Sciweavers

2526 search results - page 442 / 506
» A Comparative Evaluation of Name-Matching Algorithms
Sort
View
WWW
2007
ACM
14 years 9 months ago
Demographic prediction based on user's browsing behavior
Demographic information plays an important role in personalized web applications. However, it is usually not easy to obtain this kind of personal data such as age and gender. In t...
Jian Hu, Hua-Jun Zeng, Hua Li, Cheng Niu, Zheng Ch...
VLDB
2004
ACM
161views Database» more  VLDB 2004»
14 years 9 months ago
Supporting top-k join queries in relational databases
Ranking queries produce results that are ordered on some computed score. Typically, these queries involve joins, where users are usually interested only in the top-k join results....
Ihab F. Ilyas, Walid G. Aref, Ahmed K. Elmagarmid
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
14 years 9 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
ICSE
2007
IEEE-ACM
14 years 9 months ago
Refactoring for Parameterizing Java Classes
Type safety and expressiveness of many existing Java libraries and their client applications would improve, if the libraries were upgraded to define generic classes. Efficient and...
Adam Kiezun, Michael D. Ernst, Frank Tip, Robert M...
MOBIHOC
2005
ACM
14 years 8 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning