Sciweavers

1186 search results - page 203 / 238
» A New Approach to Secure Logging
Sort
View
ANCS
2009
ACM
14 years 10 months ago
Range Tries for scalable address lookup
In this paper we introduce the Range Trie, a new multiway tree data structure for address lookup. Each Range Trie node maps to an address range [Na, Nb) and performs multiple comp...
Ioannis Sourdis, Georgios Stefanakis, Ruben de Sme...
90
Voted
WWW
2011
ACM
14 years 7 months ago
Context-sensitive query auto-completion
Query auto completion is known to provide poor predictions of the user’s query when her input prefix is very short (e.g., one or two characters). In this paper we show that con...
Ziv Bar-Yossef, Naama Kraus
122
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
Taming user-generated content in mobile networks via Drop Zones
Abstract—Smartphones have changed the way people communicate. Most prominently, using commonplace mobile device features (e.g., high resolution cameras), they started producing a...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
NAR
2011
233views Computer Vision» more  NAR 2011»
14 years 3 months ago
TIARA: a database for accurate analysis of multiple personal genomes based on cross-technology
High-throughput genomic technologies have been used to explore personal human genomes for the past few years. Although the integration of technologies is important for high-accura...
Dongwan Hong, Sung-Soo Park, Young Seok Ju, Sheehy...
80
Voted
ICML
2009
IEEE
16 years 1 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...