Sciweavers

444 search results - page 59 / 89
» Performance Analysis of Peer-to-Peer Storage Systems
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
CC
2007
Springer
109views System Software» more  CC 2007»
14 years 4 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
CLEF
2008
Springer
13 years 11 months ago
UniNE at Domain-Specific IR - CLEF 2008
Our first objective in participating in this domain-specific evaluation campaign is to propose and evaluate various indexing and search strategies for the German, English and Russ...
Claire Fautsch, Ljiljana Dolamic, Jacques Savoy
SIGIR
2008
ACM
13 years 9 months ago
Evaluation over thousands of queries
Information retrieval evaluation has typically been performed over several dozen queries, each judged to near-completeness. There has been a great deal of recent work on evaluatio...
Ben Carterette, Virgiliu Pavlu, Evangelos Kanoulas...
EDBT
2009
ACM
184views Database» more  EDBT 2009»
14 years 4 months ago
Distributed similarity search in high dimensions using locality sensitive hashing
In this paper we consider distributed K-Nearest Neighbor (KNN) search and range query processing in high dimensional data. Our approach is based on Locality Sensitive Hashing (LSH...
Parisa Haghani, Sebastian Michel, Karl Aberer