Sciweavers

511 search results - page 71 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
125
Voted
CIKM
2009
Springer
15 years 8 months ago
Low-cost management of inverted files for online full-text search
In dynamic environments with frequent content updates, we require online full-text search that scales to large data collections and achieves low search latency. Several recent met...
Giorgos Margaritis, Stergios V. Anastasiadis
AVI
2010
15 years 4 months ago
An architecture and a visual interface for tagging the 3D web
Content classification performed by end users is spreading through the web. Most of the work done so far is related to the hypermedia web. In spite of that, there is a growing mas...
Fabio Pittarello
134
Voted
RECSYS
2009
ACM
15 years 8 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
SIGIR
2012
ACM
13 years 6 months ago
To index or not to index: time-space trade-offs in search engines with positional ranking functions
Positional ranking functions, widely used in web search engines, improve result quality by exploiting the positions of the query terms within documents. However, it is well known ...
Diego Arroyuelo, Senén González, Mau...
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
16 years 3 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...