Sciweavers

6020 search results - page 1182 / 1204
» A New Approach to Model Counting
Sort
View
128
Voted
SIGIR
2002
ACM
15 years 1 months ago
Empirical studies in strategies for Arabic retrieval
This work evaluates a few search strategies for Arabic monolingual and cross-lingual retrieval, using the TREC Arabic corpus as the test-bed. The release by NIST in 2001 of an Ara...
Jinxi Xu, Alexander Fraser, Ralph M. Weischedel
144
Voted
CORR
2010
Springer
118views Education» more  CORR 2010»
15 years 1 months ago
Large scale probabilistic available bandwidth estimation
The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: i) most tools report a point...
Frederic Thouin, Mark Coates, Michael G. Rabbat
EDBT
2010
ACM
181views Database» more  EDBT 2010»
15 years 13 days ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
143
Voted
PVLDB
2010
128views more  PVLDB 2010»
15 years 8 days ago
Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++
Supporting legacy applications when the database schema evolves represents a long-standing challenge of practical and theoretical importance. Recent work has produced algorithms a...
Carlo Curino, Hyun Jin Moon, Alin Deutsch, Carlo Z...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 12 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
« Prev « First page 1182 / 1204 Last » Next »