Sciweavers

8636 search results - page 1479 / 1728
» How Developers Copy
Sort
View
ICDE
2012
IEEE
197views Database» more  ICDE 2012»
13 years 6 months ago
GSLPI: A Cost-Based Query Progress Indicator
Abstract—Progress indicators for SQL queries were first published in 2004 with the simultaneous and independent proposals from Chaudhuri et al. and Luo et al. In this paper, we ...
Jiexing Li, Rimma V. Nehme, Jeffrey F. Naughton
INFOCOM
2012
IEEE
13 years 6 months ago
Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption
—Conserving network-wide energy consumption is becoming an increasingly important concern for network operators. In this work, we study network-wide energy conservation problem w...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 6 months ago
eTrust: understanding trust evolution in an online world
Most existing research about online trust assumes static trust relations between users. As we are informed by social sciences, trust evolves as humans interact. Little work exists...
Jiliang Tang, Huan Liu, Huiji Gao, Atish Das Sarma...
155
Voted
SIGIR
2012
ACM
13 years 6 months ago
Robust ranking models via risk-sensitive optimization
Many techniques for improving search result quality have been proposed. Typically, these techniques increase average effectiveness by devising advanced ranking features and/or by...
Lidan Wang, Paul N. Bennett, Kevyn Collins-Thompso...
« Prev « First page 1479 / 1728 Last » Next »