Sciweavers

374 search results - page 49 / 75
» An Empirical Analysis of Personal Digital Document Structure...
Sort
View
CIKM
2007
Springer
15 years 8 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
112
Voted
CIKM
2008
Springer
15 years 3 months ago
Large-scale, parallel automatic patent annotation
When researching new product ideas or filing new patents, inventors need to retrieve all relevant pre-existing know-how and/or to exploit and enforce patents in their technologica...
Milan Agatonovic, Niraj Aswani, Kalina Bontcheva, ...
125
Voted
CSUR
1999
159views more  CSUR 1999»
15 years 1 months ago
Hubs, authorities, and communities
The Web can be naturally modeled as a directed graph, consisting of a set of abstract nodes (the pages) joined by directional edges (the hyperlinks). Hyperlinks encode a considerab...
Jon M. Kleinberg
VLDB
2002
ACM
193views Database» more  VLDB 2002»
15 years 1 months ago
REFEREE: An Open Framework for Practical Testing of Recommender Systems using ResearchIndex
Automated recommendation (e.g., personalized product recommendation on an ecommerce web site) is an increasingly valuable service associated with many databases--typically online ...
Dan Cosley, Steve Lawrence, David M. Pennock
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
16 years 2 months ago
Mining significant graph patterns by leap search
With ever-increasing amounts of graph data from disparate sources, there has been a strong need for exploiting significant graph patterns with user-specified objective functions. ...
Xifeng Yan, Hong Cheng, Jiawei Han, Philip S. Yu