Sciweavers

4486 search results - page 776 / 898
» Cross-Evaluation: A new model for information system evaluat...
Sort
View
EDBT
2010
ACM
181views Database» more  EDBT 2010»
14 years 8 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
IMC
2010
ACM
14 years 7 months ago
Resolving IP aliases with prespecified timestamps
Operators and researchers want accurate router-level views of the Internet for purposes including troubleshooting and modeling. However, tools such as traceroute return IP address...
Justine Sherry, Ethan Katz-Bassett, Mary Pimenova,...
BMCBI
2011
14 years 5 months ago
DoBo: Protein domain boundary prediction by integrating evolutionary signals and machine learning
Background: Accurate identification of protein domain boundaries is useful for protein structure determination and prediction. However, predicting protein domain boundaries from a...
Jesse Eickholt, Xin Deng, Jianlin Cheng
ACMDIS
2004
ACM
15 years 3 months ago
Sharing multimedia content with interactive public displays: a case study
The Plasma Posters are large screen, digital, interactive posterboards designed for informal content sharing within teams, groups, organizations and communities. Leveraging the fa...
Elizabeth F. Churchill, Les Nelson, Laurent Denoue...
SIGIR
2010
ACM
15 years 1 months ago
The importance of anchor text for ad hoc search revisited
It is generally believed that propagated anchor text is very important for effective Web search as offered by the commercial search engines. “Google Bombs” are a notable illus...
Marijn Koolen, Jaap Kamps