Sciweavers

15 search results - page 3 / 3
» Deleting index entries from compliance storage
Sort
View
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
14 years 5 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
PODS
2006
ACM
216views Database» more  PODS 2006»
14 years 5 months ago
Cache-oblivious string B-trees
B-trees are the data structure of choice for maintaining searchable data on disk. However, B-trees perform suboptimally ? when keys are long or of variable length, ? when keys are...
Michael A. Bender, Martin Farach-Colton, Bradley C...
CIKM
2008
Springer
13 years 7 months ago
Creating tag hierarchies for effective navigation in social media
In social media, such as blogs, since the content naturally evolves over time, it is hard or in many cases impossible to organize the content for effective navigation. Thus, one c...
K. Selçuk Candan, Luigi Di Caro, Maria Luis...
CLEF
2006
Springer
13 years 9 months ago
MorphoSaurus in ImageCLEF 2006: The Effect of Subwords On Biomedical IR
We here describe the subword approach we used in the 2006 ImageCLEF Medical Image Retrieval task. It is based on the assupmtion that neither fully inflected nor automatically stem...
Philipp Daumke, Jan Paetzold, Kornél G. Mar...
CLEF
2006
Springer
13 years 9 months ago
University of Alicante at WiQA 2006
This paper presents the participation of University of Alicante at the WiQA pilot task organized as part of the CLEF 2006 campaign. For a given set of topics, this task presuppose...
Antonio Toral Ruiz, Georgiana Puscasu, Lorenza Mor...