Sciweavers

3086 search results - page 505 / 618
» Developing Secure Web Applications
Sort
View
KDD
2008
ACM
115views Data Mining» more  KDD 2008»
14 years 9 months ago
Topical query decomposition
We introduce the problem of query decomposition, where we are given a query and a document retrieval system, and we want to produce a small set of queries whose union of resulting...
Francesco Bonchi, Carlos Castillo, Debora Donato, ...
BROADNETS
2007
IEEE
14 years 3 months ago
Assessing the impact of BitTorrent on DOCSIS networks
Abstract— BitTorrent is a widely deployed peer-to-peer protocol that provides scalable file sharing capabilities. While BitTorrent applications contribute to the demand for high...
James J. Martin, James Westall
HIPC
2007
Springer
14 years 1 months ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
CIKM
2008
Springer
13 years 10 months ago
Social tags: meaning and suggestions
This paper aims to quantify two common assumptions about social tagging: (1) that tags are “meaningful” and (2) that the tagging process is influenced by tag suggestions. For...
Fabian M. Suchanek, Milan Vojnovic, Dinan Gunaward...
ICDM
2010
IEEE
217views Data Mining» more  ICDM 2010»
13 years 7 months ago
iSAX 2.0: Indexing and Mining One Billion Time Series
There is an increasingly pressing need, by several applications in diverse domains, for developing techniques able to index and mine very large collections of time series. Examples...
Alessandro Camerra, Themis Palpanas, Jin Shieh, Ea...