Sciweavers

82 search results - page 14 / 17
» Finding similar questions in large question and answer archi...
Sort
View
STOC
2001
ACM
134views Algorithms» more  STOC 2001»
16 years 1 days ago
Data-streams and histograms
Histograms are typically used to approximate data distributions. Histograms and related synopsis structures have been successful in a wide variety of popular database applications...
Sudipto Guha, Nick Koudas, Kyuseok Shim
SOFSEM
2000
Springer
15 years 3 months ago
Exhaustive Search, Combinatorial Optimization and Enumeration: Exploring the Potential of Raw Computing Power
For half a century since computers came into existence, the goal of finding elegant and efficient algorithms to solve "simple" (welldefined and well-structured) problems ...
Jürg Nievergelt
104
Voted
COCO
2009
Springer
131views Algorithms» more  COCO 2009»
15 years 6 months ago
A Multi-Round Communication Lower Bound for Gap Hamming and Some Consequences
—The Gap-Hamming-Distance problem arose in the context of proving space lower bounds for a number of key problems in the data stream model. In this problem, Alice and Bob have to...
Joshua Brody, Amit Chakrabarti
BMCBI
2008
140views more  BMCBI 2008»
14 years 12 months ago
Corpus annotation for mining biomedical events from literature
Background: Advanced Text Mining (TM) such as semantic enrichment of papers, event or relation extraction, and intelligent Question Answering have increasingly attracted attention...
Jin-Dong Kim, Tomoko Ohta, Jun-ichi Tsujii
93
Voted
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella