Sciweavers

469 search results - page 75 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
PLDI
2006
ACM
14 years 1 months ago
Optimizing memory transactions
Atomic blocks allow programmers to delimit sections of code as ‘atomic’, leaving the language’s implementation to enforce atomicity. Existing work has shown how to implement...
Timothy L. Harris, Mark Plesko, Avraham Shinnar, D...
ECAI
2010
Springer
13 years 8 months ago
Extraction of Places Related to Flickr Tags
Geographic information systems use databases to map keywords to places. These databases are currently most often created by using a top-down approach based on the geographic defini...
Yukino Baba, Fuyuki Ishikawa, Shinichi Honiden
SIGMOD
2004
ACM
140views Database» more  SIGMOD 2004»
14 years 7 months ago
SoundCompass: A Practical Query-by-Humming System
This paper describes our practical query-by-humming system, SoundCompass, which is being used as a karaoke song selection system in Japan. First, we describe the fundamental techn...
Naoko Kosugi, Yasushi Sakurai, Masashi Morimoto
ECIR
2009
Springer
13 years 5 months ago
Refining Keyword Queries for XML Retrieval by Combining Content and Structure
Abstract. The structural heterogeneity and complexity of XML repositories makes query formulation challenging for users who have little knowledge of XML. To assist its users, an XM...
Desislava Petkova, W. Bruce Croft, Yanlei Diao
WWW
2008
ACM
14 years 8 months ago
Yes, there is a correlation: - from social networks to personal behavior on the web
Characterizing the relationship that exists between a person's social group and his/her personal behavior has been a long standing goal of social network analysts. In this pa...
Parag Singla, Matthew Richardson