Sciweavers

7593 search results - page 1367 / 1519
» Querying XML Databases
Sort
View
149
Voted
JCDL
2009
ACM
127views Education» more  JCDL 2009»
15 years 10 months ago
Finding topic trends in digital libraries
We propose a generative model based on latent Dirichlet allocation for mining distinct topics in document collections by integrating the temporal ordering of documents into the ge...
Levent Bolelli, Seyda Ertekin, Ding Zhou, C. Lee G...
SIGCOMM
2009
ACM
15 years 10 months ago
DECOR: DEClaritive network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundame...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
BIBE
2008
IEEE
272views Bioinformatics» more  BIBE 2008»
15 years 10 months ago
Design and implementation of the Smith-Waterman algorithm on the CUDA-compatible GPU
— This paper describes a design and implementation of the Smith-Waterman algorithm accelerated on the graphics processing unit (GPU). Our method is implemented using compute uni...
Yuma Munekawa, Fumihiko Ino, Kenichi Hagihara
DASFAA
2008
IEEE
109views Database» more  DASFAA 2008»
15 years 10 months ago
Bulk-Loading the ND-Tree in Non-ordered Discrete Data Spaces
Applications demanding multidimensional index structures for performing efficient similarity queries often involve a large amount of data. The conventional tuple-loading approach t...
Hyun-Jeong Seok, Gang Qian, Qiang Zhu, Alexander R...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 10 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
« Prev « First page 1367 / 1519 Last » Next »