Sciweavers

950 search results - page 100 / 190
» Evaluation over thousands of queries
Sort
View
ACSC
2006
IEEE
14 years 4 months ago
Shallow NLP techniques for internet search
Information Retrieval (IR) is a major component in many of our daily activities, with perhaps its most prominent role manifested in search engines. Today’s most advanced engines...
Alex Penev, Raymond K. Wong
ER
1999
Springer
155views Database» more  ER 1999»
14 years 2 months ago
Detecting Redundancy in Data Warehouse Evolution
A Data Warehouse DW can be abstractly seen as a set of materialized views de ned over a set of remote data sources. A DW is intended to satisfy a set of queries. The views materi...
Dimitri Theodoratos
CIKM
2009
Springer
14 years 1 months ago
Effective, design-independent XML keyword search
Keyword search techniques that take advantage of XML structure make it very easy for ordinary users to query XML databases, but current approaches to processing these queries rely...
Arash Termehchy, Marianne Winslett
ISI
2006
Springer
13 years 10 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
JC
2007
94views more  JC 2007»
13 years 10 months ago
On the complexity of the multivariate Sturm-Liouville eigenvalue problem
We study the complexity of approximating the smallest eigenvalue of −∆ + q with Dirichlet boundary conditions on the d-dimensional unit cube. Here ∆ is the Laplacian, and th...
A. Papageorgiou