Sciweavers

12257 search results - page 2263 / 2452
» Analysis of Algorithms
Sort
View
143
Voted
WWW
2005
ACM
16 years 4 months ago
Improving recommendation lists through topic diversification
In this work we present topic diversification, a novel method designed to balance and diversify personalized recommendation lists in order to reflect the user's complete spec...
Cai-Nicolas Ziegler, Sean M. McNee, Joseph A. Kons...
119
Voted
WWW
2003
ACM
16 years 4 months ago
On the bursty evolution of blogspace
We propose two new tools to address the evolution of hyperlinked corpora. First, we define time graphs to extend the traditional notion of an evolving directed graph, capturing li...
Ravi Kumar, Jasmine Novak, Prabhakar Raghavan, And...
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
16 years 4 months ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...
115
Voted
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
16 years 4 months ago
Characteristic relational patterns
Research in relational data mining has two major directions: finding global models of a relational database and the discovery of local relational patterns within a database. While...
Arne Koopman, Arno Siebes
225
Voted
PODS
2009
ACM
130views Database» more  PODS 2009»
16 years 4 months ago
Secondary indexing in one dimension: beyond b-trees and bitmap indexes
Let be a finite, ordered alphabet, and consider a string x = x1x2 . . . xn n . A secondary index for x answers alphabet range queries of the form: Given a range [al, ar] , retu...
Rasmus Pagh, Srinivasa Rao Satti
« Prev « First page 2263 / 2452 Last » Next »