Sciweavers

8322 search results - page 1508 / 1665
» What Are We Looking for
Sort
View
WSDM
2009
ACM
115views Data Mining» more  WSDM 2009»
14 years 5 months ago
Discovering and using groups to improve personalized search
Personalized Web search takes advantage of information about an individual to identify the most relevant results for that person. A challenge for personalization lies in collectin...
Jaime Teevan, Meredith Ringel Morris, Steve Bush
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 5 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
ICSE
2009
IEEE-ACM
14 years 5 months ago
Toward deeply adaptive societies of digital systems
Modern societies are pervaded by computerized, heterogeneous devices designed for specific purposes, but also more and more often capable of interacting with other devices for en...
Antonio Carzaniga, Giovanni Denaro, Mauro Pezz&egr...
CCGRID
2009
IEEE
14 years 5 months ago
The Eucalyptus Open-Source Cloud-Computing System
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC ...
Daniel Nurmi, Richard Wolski, Chris Grzegorczyk, G...
FOCS
2009
IEEE
14 years 5 months ago
Distance Oracles for Sparse Graphs
Abstract— Thorup and Zwick, in their seminal work, introduced the approximate distance oracle, which is a data structure that answers distance queries in a graph. For any integer...
Christian Sommer 0002, Elad Verbin, Wei Yu
« Prev « First page 1508 / 1665 Last » Next »