Sciweavers

3652 search results - page 256 / 731
» A study of query length
Sort
View
ALGORITHMICA
2011
14 years 10 months ago
On Bounded Leg Shortest Paths Problems
Let V be a set of points in a d-dimensional lp-metric space. Let s, t ∈ V and let L be any real number. An L-bounded leg path from s to t is an ordered set of points which conne...
Liam Roditty, Michael Segal
225
Voted
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
16 years 4 months ago
Clean Answers over Dirty Databases: A Probabilistic Approach
The detection of duplicate tuples, corresponding to the same real-world entity, is an important task in data integration and cleaning. While many techniques exist to identify such...
Ariel Fuxman, Periklis Andritsos, Renée J. ...
CIKM
2010
Springer
14 years 10 months ago
Predicting short-term interests using activity-based search context
A query considered in isolation offers limited information about a searcher's intent. Query context that considers pre-query activity (e.g., previous queries and page visits)...
Ryen W. White, Paul N. Bennett, Susan T. Dumais
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
126
Voted
IS
2006
15 years 3 months ago
Adaptive cycle management in soft real-time disk retrieval
The objective of this study is to determine the right cycle management policy to service periodic soft real-time disk retrieval. Cycle based disk scheduling provides an effective ...
Youjip Won, Ilhoon Shin, Kern Koh