Sciweavers

3652 search results - page 87 / 731
» A study of query length
Sort
View
WADS
2009
Springer
267views Algorithms» more  WADS 2009»
14 years 12 days ago
Computing the Implicit Voronoi Diagram in Triple Precision
In a paper that considered arithmetic precision as a limited resource in the design and analysis of algorithms, Liotta, Preparata and Tamassia defined an “implicit Voronoi diagr...
David L. Millman, Jack Snoeyink
ESA
1999
Springer
110views Algorithms» more  ESA 1999»
14 years 5 days ago
Geometric Searching over the Rationals
We revisit classical geometric search problems under the assumption of rational coordinates. Our main result is a tight bound for point separation, ie, to determine whether n given...
Bernard Chazelle
POPL
2000
ACM
13 years 11 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
TREC
2004
13 years 9 months ago
The Hong Kong Polytechnic University at the TREC 2004 Robust Track
In the robust track, we mainly tested our passage-based retrieval model with different passage sizes and weighting schemes. In our approach, we used two retrieval models, namely t...
D. Y. Wang, Robert Wing Pong Luk, Kam-Fai Wong
TREC
2000
13 years 9 months ago
Reflections on "Aboutness" TREC-9 Evaluation Experiments at Justsystem
TREC-9 evaluation experiments at the Justsystem site are described with a focus on "aboutness" based approach in text retrieval. Experiments on the effects of supplement...
Sumio Fujita