Sciweavers

4498 search results - page 745 / 900
» How to Invent Functions
Sort
View
123
Voted
WEBDB
2010
Springer
152views Database» more  WEBDB 2010»
15 years 8 months ago
Popularity-Guided Top-k Extraction of Entity Attributes
Recent progress in information extraction technology has enabled a vast array of applications that rely on structured data that is embedded in natural-language text. In particular...
Matthew Solomon, Cong Yu, Luis Gravano
137
Voted
CSFW
2002
IEEE
15 years 8 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
159
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Provisioning Content Distribution Networks for Streaming Media
This paper develops simple cost models for provisioning content distribution networks that use the simple and highly scalable bandwidth skimming protocol for streaming. New insight...
Jussara M. Almeida, Derek L. Eager, Michael C. Fer...
133
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Stability of a Multicast Tree
— Most of the currently deployed multicast protocols (e.g. DVMRP, PIM, MOSPF) build one shortest path multicast tree per sender, the tree being rooted at the sender’s subnetwor...
Piet Van Mieghem, Milena Janic
CIKM
2009
Springer
15 years 8 months ago
Probabilistic skyline queries
The ability to deal with uncertain information is becoming increasingly important for modern database applications. Whereas a conventional (certain) object is usually represented ...
Christian Böhm, Frank Fiedler, Annahita Oswal...