Sciweavers

8349 search results - page 1489 / 1670
» Introduction to Information Retrieval
Sort
View
SAC
2004
ACM
15 years 9 months ago
Caching in Web memory hierarchies
Web cache replacement algorithms have received a lot of attention during the past years. Though none of the proposed algorithms deals efficiently with all the particularities of t...
Dimitrios Katsaros, Yannis Manolopoulos
VAST
2004
ACM
15 years 9 months ago
iClay: Digitizing Cuneiform
Advances in digital technology for the graphic and textual representation of manuscripts have not, until recently, been applied to the worldʼs oldest manuscripts, cuneiform table...
Jonathan D. Cohen, Donald Duncan, Dean Snyder, Jer...
WIDM
2004
ACM
15 years 9 months ago
User evaluation of the NASA technical report server recommendation service
We present the user evaluation of two recommendation server methodologies implemented for the NASA Technical Report Server (NTRS). One methodology for generating recommendations u...
Michael L. Nelson, Johan Bollen, JoAnne R. Calhoun...
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
15 years 9 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
ADBIS
2004
Springer
147views Database» more  ADBIS 2004»
15 years 9 months ago
A Hybrid Keyword Search across Peer-to-Peer Federated Databases
The need for Keyword search in databases is suggested both by Web integration with legacy database management system and by dynamic Web publication. However, it sacrifices the inh...
Jungkee Kim, Geoffrey Fox
« Prev « First page 1489 / 1670 Last » Next »