Sciweavers

2504 search results - page 340 / 501
» Methods for comparing rankings of search engine results
Sort
View
221
Voted
ECOOP
2009
Springer
16 years 2 months ago
MAPO: Mining and Recommending API Usage Patterns
To improve software productivity, when constructing new software systems, programmers often reuse existing libraries or frameworks by invoking methods provided in their APIs. Those...
Hao Zhong, Tao Xie, Lu Zhang, Jian Pei, Hong Mei
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
ICDE
2011
IEEE
232views Database» more  ICDE 2011»
14 years 5 months ago
XClean: Providing valid spelling suggestions for XML keyword queries
—An important facility to aid keyword search on XML data is suggesting alternative queries when user queries contain typographical errors. Query suggestion thus can improve users...
Yifei Lu, Wei Wang, Jianxin Li, Chengfei Liu
TC
2008
15 years 1 months ago
Exploiting In-Memory and On-Disk Redundancy to Conserve Energy in Storage Systems
Abstract--Today's storage systems place an imperative demand on energy efficiency. A storage system often places single-rotationrate disks into standby mode by stopping them f...
Jun Wang, Xiaoyu Yao, Huijun Zhu
DEXA
2004
Springer
140views Database» more  DEXA 2004»
15 years 7 months ago
Extracting User Behavior by Web Communities Technology on Global Web Logs
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...