Sciweavers

1088 search results - page 204 / 218
» Probabilistic query expansion using query logs
Sort
View
USENIX
2003
15 years 1 months ago
CUP: Controlled Update Propagation in Peer-to-Peer Networks
— This paper proposes CUP, a protocol for performing Controlled Update Propagation to maintain caches of metadata in peer-to-peer networks. To moderate propagation without imposi...
Mema Roussopoulos, Mary Baker
85
Voted
CC
1998
Springer
100views System Software» more  CC 1998»
14 years 11 months ago
Symmetric Alternation Captures BPP
We introduce the natural class SP 2 containing those languages which may be expressed in terms of two symmetric quanti ers. This class lies between P 2 and P 2 P 2 and naturall...
Alexander Russell, Ravi Sundaram
MOBISYS
2008
ACM
15 years 11 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
MOBISYS
2007
ACM
15 years 11 months ago
Triage: balancing energy and quality of service in a microserver
The ease of deployment of battery-powered and mobile systems is pushing the network edge far from powered infrastructures. A primary challenge in building untethered systems is of...
Nilanjan Banerjee, Jacob Sorber, Mark D. Corner, S...
WWW
2003
ACM
16 years 12 days ago
Mining topic-specific concepts and definitions on the web
Traditionally, when one wants to learn about a particular topic, one reads a book or a survey paper. With the rapid expansion of the Web, learning in-depth knowledge about a topic...
Bing Liu, Chee Wee Chin, Hwee Tou Ng