Sciweavers

3241 search results - page 137 / 649
» Searching for Hidden-Web Databases
Sort
View
FQAS
2009
Springer
212views Database» more  FQAS 2009»
15 years 4 months ago
Exploiting Social Tagging Profiles to Personalize Web Search
In this paper, we investigate the exploitation of user profiles defined in social tagging services to personalize Web search. One of the key challenges of a personalization framewo...
David Vallet, Iván Cantador, Joemon M. Jose
CLUSTER
2007
IEEE
15 years 4 months ago
Sequential and parallel implementation of a constraint-based algorithm for searching protein structures
— Data mining in biological structure libraries can be a powerful tool to better understand biochemical processes. This article introduces the LISA algorithm which enables the re...
Sascha Hunold, Thomas Rauber, Georg Wille
ICPADS
2005
IEEE
15 years 3 months ago
Exploiting Multi-level Parallelism for Homology Search using General Purpose Processors
New biological experimental techniques are continuing to generate large amounts of data using DNA, RNA, human genome and protein sequences. The quantity and quality of data from t...
Xiandong Meng, Vipin Chaudhary
DBISP2P
2005
Springer
172views Database» more  DBISP2P 2005»
15 years 3 months ago
A Content-Addressable Network for Similarity Search in Metric Spaces
In this paper we present a scalable and distributed access structure for similarity search in metric spaces. The approach is based on the Content– addressable Network (CAN) parad...
Fabrizio Falchi, Claudio Gennaro, Pavel Zezula
TCC
2005
Springer
95views Cryptology» more  TCC 2005»
15 years 3 months ago
Keyword Search and Oblivious Pseudorandom Functions
We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are ...
Michael J. Freedman, Yuval Ishai, Benny Pinkas, Om...