Sciweavers

641 search results - page 122 / 129
» Studying Query Expansion Effectiveness
Sort
View
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
14 years 9 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal
PODS
2009
ACM
86views Database» more  PODS 2009»
14 years 8 months ago
Reverse data exchange: coping with nulls
An inverse of a schema mapping M is intended to "undo" what M does, thus providing a way to perform "reverse" data exchange. In recent years, three different f...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 7 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
SIGMOD
2002
ACM
93views Database» more  SIGMOD 2002»
14 years 7 months ago
Implementing database operations using SIMD instructions
Modern CPUs have instructions that allow basic operations to be performed on several data elements in parallel. These instructions are called SIMD instructions, since they apply a...
Jingren Zhou, Kenneth A. Ross
GISCIENCE
2010
Springer
192views GIS» more  GISCIENCE 2010»
13 years 8 months ago
Automatic Extraction of Destinations, Origins and Route Parts from Human Generated Route Directions
Researchers from the cognitive and spatial sciences are studying text descriptions of movement patterns in order to examine how humans communicate and understand spatial informatio...
Xiao Zhang, Prasenjit Mitra, Alexander Klippel, Al...