Sciweavers

5166 search results - page 842 / 1034
» Web Query Optimizer
Sort
View
HICSS
2005
IEEE
158views Biometrics» more  HICSS 2005»
14 years 2 months ago
Social Networks in Peer-to-Peer Systems
The Gnutella protocol requires peers to broadcast messages to their neighbours when they search files. The message passing generates a lot of traffic in the network, which degrade...
Yamini Upadrashta, Julita Vassileva, Winfried K. G...
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
14 years 2 months ago
Signature-based Filtering Techniques for Structural Joins of XML Data
Queries on XML documents typically combine selections on element contents, and, via path expressions, the structural relationships between tagged elements. Efficient support for ...
Huan Huo, Guoren Wang, Chuan Yang, Rui Zhou
IPPS
2005
IEEE
14 years 2 months ago
Comparison of Current BLAST Software on Nucleotide Sequences
The computational power needed for searching exponentially growing databases, such as GenBank, has increased dramatically. Three different implementations of the most widely used ...
I. Elizabeth Cha, Eric C. Rouchka
IMC
2005
ACM
14 years 2 months ago
Improving Sketch Reconstruction Accuracy Using Linear Least Squares Method
Sketch is a sublinear space data structure that allows one to approximately reconstruct the value associated with any given key in an input data stream. It is the basis for answer...
Gene Moo Lee, Huiya Liu, Young Yoon, Yin Zhang
SSD
2005
Springer
153views Database» more  SSD 2005»
14 years 2 months ago
Constrained Shortest Path Computation
This paper proposes and solves a-autonomy and k-stops shortest path problems in large spatial databases. Given a source s and a destination d, an aautonomy query retrieves a sequen...
Manolis Terrovitis, Spiridon Bakiras, Dimitris Pap...