Sciweavers

18697 search results - page 3700 / 3740
» Systemic Security Management
Sort
View
CLEF
2007
Springer
15 years 8 months ago
Experiments in Classification Clustering and Thesaurus Expansion for Domain Specific Cross-Language Retrieval
In this paper we will describe Berkeley's approach to the Domain Specific (DS) track for CLEF 2007. This year we are using forms of the Entry Vocabulary Indexes and Thesaurus...
Ray R. Larson
SIGMOD
2010
ACM
196views Database» more  SIGMOD 2010»
15 years 8 months ago
Connected substructure similarity search
Substructure similarity search is to retrieve graphs that approximately contain a given query graph. It has many applications, e.g., detecting similar functions among chemical com...
Haichuan Shang, Xuemin Lin, Ying Zhang, Jeffrey Xu...
CIKM
2009
Springer
15 years 8 months ago
Efficient feature weighting methods for ranking
Feature weighting or selection is a crucial process to identify an important subset of features from a data set. Removing irrelevant or redundant features can improve the generali...
Hwanjo Yu, Jinoh Oh, Wook-Shin Han
148
Voted
DIALM
2007
ACM
131views Algorithms» more  DIALM 2007»
15 years 8 months ago
Dessy: Towards Flexible Mobile Desktop Search
In the near future, mobile devices are expected to have a storage capacity comparable to today's desktop machines. As the amount of infomation grows, conventional search tool...
Eemil Lagerspetz, Tancred Lindholm, Sasu Tarkoma
CLUSTER
2009
IEEE
15 years 8 months ago
24/7 Characterization of petascale I/O workloads
Abstract--Developing and tuning computational science applications to run on extreme scale systems are increasingly complicated processes. Challenges such as managing memory access...
Philip H. Carns, Robert Latham, Robert B. Ross, Ka...
« Prev « First page 3700 / 3740 Last » Next »