Sciweavers

5090 search results - page 929 / 1018
» Constructing Strategies for Programming
Sort
View
235
Voted
ICDE
2007
IEEE
138views Database» more  ICDE 2007»
16 years 5 months ago
Representing and Querying Correlated Tuples in Probabilistic Databases
Probabilistic databases have received considerable attention recently due to the need for storing uncertain data produced by many real world applications. The widespread use of pr...
Prithviraj Sen, Amol Deshpande
246
Voted
ICDE
2006
IEEE
206views Database» more  ICDE 2006»
16 years 5 months ago
Query Co-Processing on Commodity Hardware
The rapid increase in the data volumes for the past few decades has intensified the need for high processing power for database and data mining applications. Researchers have acti...
Anastassia Ailamaki, Naga K. Govindaraju, Dinesh M...
WWW
2008
ACM
16 years 4 months ago
Learning multiple graphs for document recommendations
The Web offers rich relational data with different semantics. In this paper, we address the problem of document recommendation in a digital library, where the documents in questio...
Ding Zhou, Shenghuo Zhu, Kai Yu, Xiaodan Song, Bel...
127
Voted
WWW
2004
ACM
16 years 4 months ago
Managing versions of web documents in a transaction-time web server
This paper presents a transaction-time HTTP server, called ? Apache that supports document versioning. A document often consists of a main file formatted in HTML or XML and severa...
Curtis E. Dyreson, Hui-ling Lin, Yingxia Wang
122
Voted
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
16 years 4 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky