Sciweavers

1931 search results - page 50 / 387
» Why we blog
Sort
View
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
14 years 3 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...
SPIRE
2010
Springer
13 years 7 months ago
Why Large Closest String Instances Are Easy to Solve in Practice
We initiate the study of the smoothed complexity of the Closest String problem by proposing a semi-random model of Hamming distance. We restrict interest to the optimization versio...
Christina Boucher, Kathleen Wilkie
ENTCS
2011
131views more  ENTCS 2011»
13 years 3 months ago
Computational Complexity in Non-Turing Models of Computation: The What, the Why and the How
We preliminarily recap what is meant by complexity and non-Turing computation, by way of explanation of our title, ‘Computational Complexity in Non-Turing Models of Computationâ...
Ed Blakey
CHI
2006
ACM
14 years 9 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
SIGMOD
2006
ACM
162views Database» more  SIGMOD 2006»
14 years 8 months ago
Adaptive query processing: why, how, when, what next
Adaptive query processing has been the subject of a great deal of recent work, particularly in emerging data management environments such as data integration and data streams. We ...
Amol Deshpande, Joseph M. Hellerstein, Vijayshanka...