Sciweavers

1094 search results - page 167 / 219
» List signature schemes
Sort
View
LREC
2010
171views Education» more  LREC 2010»
13 years 9 months ago
Meta-Knowledge Annotation of Bio-Events
Biomedical corpora annotated with event-level information provide an important resource for the training of domain-specific information extraction (IE) systems. These corpora conc...
Raheel Nawaz, Paul Thompson, John McNaught, Sophia...
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 7 months ago
CONCISE: Compressed 'n' Composable Integer Set
Bit arrays, or bitmaps, are used to significantly speed up set operations in several areas, such as data warehousing, information retrieval, and data mining, to cite a few. Howeve...
Alessandro Colantonio, Roberto Di Pietro
SIAMCOMP
2000
97views more  SIAMCOMP 2000»
13 years 7 months ago
Dynamic Maintenance of Maxima of 2-d Point Sets
This paper describes an efficient scheme for the dynamic maintenance of the set of maxima of a 2-d set of points. Using the fact that the maxima can be stored in a staircase struct...
Sanjiv Kapoor
ICPADS
2010
IEEE
13 years 5 months ago
Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks
Online Social Networks (OSNs) are more and more popular recently; people may through them interact with each other for the purpose of social intercourse. The client/server OSN arch...
Jehn-Ruey Jiang, Chao-Wei Hung, Jih-Wei Wu
IMC
2006
ACM
14 years 1 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan