Sciweavers

3652 search results - page 687 / 731
» A study of query length
Sort
View
KDD
2006
ACM
109views Data Mining» more  KDD 2006»
14 years 10 months ago
Extracting redundancy-aware top-k patterns
Observed in many applications, there is a potential need of extracting a small set of frequent patterns having not only high significance but also low redundancy. The significance...
Dong Xin, Hong Cheng, Xifeng Yan, Jiawei Han
CHI
2008
ACM
14 years 10 months ago
SearchBar: a search-centric web history for task resumption and information re-finding
Current user interfaces for Web search, including browsers and search engine sites, typically treat search as a transient activity. However, people often conduct complex, multique...
Dan Morris, Meredith Ringel Morris, Gina Venolia
STOC
2005
ACM
135views Algorithms» more  STOC 2005»
14 years 10 months ago
On the bias of traceroute sampling: or, power-law degree distributions in regular graphs
Understanding the graph structure of the Internet is a crucial step for building accurate network models and designing efficient algorithms for Internet applications. Yet, obtaini...
Dimitris Achlioptas, Aaron Clauset, David Kempe, C...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 10 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 10 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...