Sciweavers

672 search results - page 119 / 135
» An assessment of tag presentation techniques
Sort
View
CCS
2011
ACM
12 years 7 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
ICDE
2009
IEEE
194views Database» more  ICDE 2009»
14 years 9 months ago
Effective XML Keyword Search with Relevance Oriented Ranking
Abstract-- Inspired by the great success of information retrieval (IR) style keyword search on the web, keyword search on XML has emerged recently. The difference between text data...
Zhifeng Bao, Tok Wang Ling, Bo Chen, Jiaheng Lu
WWW
2004
ACM
14 years 8 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
ADMA
2009
Springer
212views Data Mining» more  ADMA 2009»
14 years 2 months ago
Automating Gene Expression Annotation for Mouse Embryo
It is of high biomedical interest to identify gene interactions and networks that are associated with developmental and physiological functions in the mouse embryo. There are now v...
Liangxiu Han, Jano I. van Hemert, Richard A. Baldo...
SENSYS
2004
ACM
14 years 1 months ago
Synopsis diffusion for robust aggregation in sensor networks
Previous approaches for computing duplicate-sensitive aggregates in sensor networks (e.g., in TAG) have used a tree topology, in order to conserve energy and to avoid double-count...
Suman Nath, Phillip B. Gibbons, Srinivasan Seshan,...