Sciweavers

1088 search results - page 160 / 218
» Probabilistic query expansion using query logs
Sort
View
ICALP
1994
Springer
14 years 1 months ago
Simple Fast Parallel Hashing
A hash table is a representation of a set in a linear size data structure that supports constanttime membership queries. We show how to construct a hash table for any given set of...
Joseph Gil, Yossi Matias
ECCC
2010
124views more  ECCC 2010»
13 years 9 months ago
Lower Bounds and Hardness Amplification for Learning Shallow Monotone Formulas
Much work has been done on learning various classes of "simple" monotone functions under the uniform distribution. In this paper we give the first unconditional lower bo...
Vitaly Feldman, Homin K. Lee, Rocco A. Servedio
DEBU
2006
138views more  DEBU 2006»
13 years 9 months ago
Avatar Information Extraction System
The AVATAR Information Extraction System (IES) at the IBM Almaden Research Center enables highprecision, rule-based, information extraction from text-documents. Drawing from our e...
T. S. Jayram, Rajasekar Krishnamurthy, Sriram Ragh...
SIGMOD
2007
ACM
112views Database» more  SIGMOD 2007»
14 years 9 months ago
A random walk approach to sampling hidden databases
A large part of the data on the World Wide Web is hidden behind form-like interfaces. These interfaces interact with a hidden backend database to provide answers to user queries. ...
Arjun Dasgupta, Gautam Das, Heikki Mannila
ADC
2009
Springer
151views Database» more  ADC 2009»
14 years 27 days ago
Unified Q-ary Tree for RFID Tag Anti-Collision Resolution
Radio Frequency Identification (RFID) technology uses radio-frequency waves to automatically identify people or objects. A large volume of data, resulting from the fast capturing ...
Prapassara Pupunwiwat, Bela Stantic