Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Numerous studies have examined the ability of query performance prediction methods to estimate a query’s quality for system effectiveness measures (such as average precision). ...
Claudia Hauff, Franciska de Jong, Diane Kelly, Lei...
Modern techniques for distributed information retrieval use a set of documents sampled from each server, but these samples have been underutilised in server selection. We describe...
The concept of location has become very popular in many applications on the Web, in particular for those which aim at connecting the real world with resources on the Web. However,...
In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data w...