Sciweavers

2032 search results - page 279 / 407
» Relevance for browsing, relevance for searching
Sort
View
FOCS
2006
IEEE
15 years 7 months ago
Higher Lower Bounds for Near-Neighbor and Further Rich Problems
We convert cell-probe lower bounds for polynomial space into stronger lower bounds for near-linear space. Our technique applies to any lower bound proved through the richness meth...
Mihai Patrascu, Mikkel Thorup
ISM
2006
IEEE
98views Multimedia» more  ISM 2006»
15 years 7 months ago
MeTaMaF: Metadata Tagging and Mapping Framework for Managing Multimedia Content
Metadata comes into forefront as a savior of multimedia search and management complexity. However, the existence of the diverse set of metadata standards and the different vocabul...
M. Anwar Hossain, Md. Anisur Rahman, Iluju Kiringa...
HICSS
2005
IEEE
158views Biometrics» more  HICSS 2005»
15 years 7 months ago
Social Networks in Peer-to-Peer Systems
The Gnutella protocol requires peers to broadcast messages to their neighbours when they search files. The message passing generates a lot of traffic in the network, which degrade...
Yamini Upadrashta, Julita Vassileva, Winfried K. G...
IWIA
2005
IEEE
15 years 7 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
SIGIR
2005
ACM
15 years 7 months ago
Using query term order for result summarisation
We report on two experiments performed to test the importance of Term Order in automatic summarisation. Experiment one was undertaken as part of DUC 2004 to which three systems we...
Shao Fen Liang, Siobhan Devlin, John Tait