Sciweavers

3368 search results - page 597 / 674
» The Complexity of Query Reliability
Sort
View
128
Voted
NAR
2006
170views more  NAR 2006»
15 years 2 months ago
The UCSC Genome Browser Database: update 2006
The University of California Santa Cruz Genome Browser Database (GBD) contains sequence and annotation data for the genomes of about a dozen vertebrate species and several major m...
Angela S. Hinrichs, Donna Karolchik, Robert Baerts...
131
Voted
IR
2007
15 years 2 months ago
Searching strategies for the Bulgarian language
This paper reports on the underlying IR problems encountered when indexing and searching with the Bulgarian language. For this language we propose a general light stemmer and demon...
Jacques Savoy
CGA
1999
15 years 2 months ago
Visualizing Large Telecommunication Data Sets
displays to abstract network data and let users interactwithit.Wehaveimplementedafull-scaleSwift3D prototype, which generated the examples we present here. Swift-3D We developed Sw...
Eleftherios Koutsofios, Stephen C. North, Daniel A...
137
Voted
VLDB
2002
ACM
108views Database» more  VLDB 2002»
15 years 2 months ago
Generic Database Cost Models for Hierarchical Memory Systems
Accurate prediction of operator execution time is a prerequisite for database query optimization. Although extensively studied for conventional disk-based DBMSs, cost modeling in ...
Stefan Manegold, Peter A. Boncz, Martin L. Kersten
142
Voted
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 1 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...