Sciweavers

587 search results - page 100 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
SIGMOD
2010
ACM
208views Database» more  SIGMOD 2010»
15 years 2 months ago
Hierarchically organized skew-tolerant histograms for geographic data objects
Histograms have been widely used for fast estimation of query result sizes in query optimization. In this paper, we propose a new histogram method, called the Skew-Tolerant Histog...
Yohan J. Roh, Jae Ho Kim, Yon Dohn Chung, Jin Hyun...
116
Voted
INFOCOM
2005
IEEE
15 years 7 months ago
A distributed adaptive cache update algorithm for the dynamic source routing protocol
On-demand routing protocols use route caches to make routing decisions. Due to frequent topology changes, cached routes easily become stale. To address the cache staleness issue i...
Xin Yu, Zvi M. Kedem
128
Voted
CIKM
2010
Springer
15 years 24 days ago
Learning to rank relevant and novel documents through user feedback
We consider the problem of learning to rank relevant and novel documents so as to directly maximize a performance metric called Expected Global Utility (EGU), which has several de...
Abhimanyu Lad, Yiming Yang
145
Voted
CHI
2009
ACM
16 years 2 months ago
Intentions: a game for classifying search query intent
Knowing the intent of a search query allows for more intelligent ways of retrieving relevant search results. Most of the recent work on automatic detection of query intent uses su...
Edith Law, Anton Mityagin, David Maxwell Chickerin...
118
Voted
DAWAK
2007
Springer
15 years 8 months ago
MOSAIC: A Proximity Graph Approach for Agglomerative Clustering
Representative-based clustering algorithms are quite popular due to their relative high speed and because of their sound theoretical foundation. On the other hand, the clusters the...
Jiyeon Choo, Rachsuda Jiamthapthaksin, Chun-Sheng ...