Sciweavers

126 search results - page 21 / 26
» Query answering exploiting structural properties
Sort
View
DASFAA
2008
IEEE
109views Database» more  DASFAA 2008»
14 years 4 months ago
Bulk-Loading the ND-Tree in Non-ordered Discrete Data Spaces
Applications demanding multidimensional index structures for performing efficient similarity queries often involve a large amount of data. The conventional tuple-loading approach t...
Hyun-Jeong Seok, Gang Qian, Qiang Zhu, Alexander R...
AAAI
2008
14 years 5 days ago
Text Categorization with Knowledge Transfer from Heterogeneous Data Sources
Multi-category classification of short dialogues is a common task performed by humans. When assigning a question to an expert, a customer service operator tries to classify the cu...
Rakesh Gupta, Lev-Arie Ratinov
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
WWW
2008
ACM
14 years 10 months ago
Scaling RDF with time
The World Wide Web Consortium's RDF standard primarily consists of (subject,property,object) triples that specify the value that a given subject has for a given property. How...
Andrea Pugliese, Octavian Udrea, V. S. Subrahmania...
ICDE
2003
IEEE
129views Database» more  ICDE 2003»
14 years 11 months ago
Representing Web Graphs
A Web repository is a large special-purpose collection of Web pages and associated indexes. Many useful queries and computations over such repositories involve traversal and navig...
Sriram Raghavan, Hector Garcia-Molina