Sciweavers

12519 search results - page 2474 / 2504
» Approximation Problems Categories
Sort
View
147
Voted
SIGMOD
2010
ACM
145views Database» more  SIGMOD 2010»
15 years 1 months ago
How to ConQueR why-not questions
One useful feature that is missing from today’s database systems is an explain capability that enables users to seek clarifications on unexpected query results. There are two t...
Quoc Trung Tran, Chee-Yong Chan
134
Voted
SISAP
2010
IEEE
135views Data Mining» more  SISAP 2010»
15 years 1 months ago
Improving the similarity search of tandem mass spectra using metric access methods
In biological applications, the tandem mass spectrometry is a widely used method for determining protein and peptide sequences from an ”in vitro” sample. The sequences are not...
Jiri Novák, Tomás Skopal, David Hoks...
124
Voted
TIFS
2010
186views more  TIFS 2010»
15 years 1 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
149
Voted
CASES
2010
ACM
15 years 20 days ago
Improved procedure placement for set associative caches
The performance of most embedded systems is critically dependent on the memory hierarchy performance. In particular, higher cache hit rate can provide significant performance boos...
Yun Liang, Tulika Mitra
249
Voted
CIKM
2010
Springer
15 years 19 days ago
Mining topic-level influence in heterogeneous networks
Influence is a complex and subtle force that governs the dynamics of social networks as well as the behaviors of involved users. Understanding influence can benefit various applic...
Lu Liu, Jie Tang, Jiawei Han, Meng Jiang, Shiqiang...
« Prev « First page 2474 / 2504 Last » Next »