Sciweavers

95 search results - page 15 / 19
» Implementation and evaluation of a quality-based search engi...
Sort
View
VLDB
2004
ACM
95views Database» more  VLDB 2004»
15 years 2 months ago
Combating Web Spam with TrustRank
Web spam pages use various techniques to achieve higher-than-deserved rankings in a search engine’s results. While human experts can identify spam, it is too expensive to manual...
Zoltán Gyöngyi, Hector Garcia-Molina, ...
ICC
2007
IEEE
199views Communications» more  ICC 2007»
15 years 3 months ago
7DS - Node Cooperation and Information Exchange in Mostly Disconnected Networks
— When the node density in a network decreases below the level necessary to sustain ad-hoc and mesh networks, communication can succeed only by leveraging node mobility and trans...
Suman Srinivasan, Arezu Moghadam, Se Gi Hong, Henn...
SIGIR
2005
ACM
15 years 3 months ago
Optimization strategies for complex queries
Previous research into the efficiency of text retrieval systems has dealt primarily with methods that consider inverted lists in sequence; these methods are known as term-at-a-tim...
Trevor Strohman, Howard R. Turtle, W. Bruce Croft
ICADL
2003
Springer
117views Education» more  ICADL 2003»
15 years 2 months ago
Metadata++: A Scalable Hierarchical Framework for Digital Libraries
: Metadata++ is a digital library system that we are developing to serve the needs of the United States Department of Agriculture Forest Service, the United States Department of th...
Mathew Weaver, Lois M. L. Delcambre, Timothy Tolle
KBSE
2010
IEEE
14 years 8 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer