Sciweavers

8468 search results - page 1562 / 1694
» The Technology of Data Stashing
Sort
View
CIKM
2005
Springer
15 years 3 months ago
Query expansion using random walk models
It has long been recognized that capturing term relationships is an important aspect of information retrieval. Even with large amounts of data, we usually only have significant ev...
Kevyn Collins-Thompson, Jamie Callan
CIKM
2005
Springer
15 years 3 months ago
Query workload-aware overlay construction using histograms
Peer-to-peer (p2p) systems offer an efficient means of data sharing among a dynamically changing set of a large number of autonomous nodes. Each node in a p2p system is connected...
Georgia Koloniari, Yannis Petrakis, Evaggelia Pito...
CIKM
2005
Springer
15 years 3 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
DIGRA
2005
Springer
15 years 3 months ago
Beyond P-1: Who Plays Online?
Academics and industry professionals alike have long been interested in developing a nuanced and empirically sound typography of online gamers. Designers and engineers are aware o...
Avery Alix
ICCS
2005
Springer
15 years 3 months ago
Java-Based Grid Service Spread and Implementation in Remote Sensing Applications
Remote sensing applications often concern very large volumes of spatio-temporal data, the emerging Grid computing technologies bring an effective solution to this problem. The Open...
Yanguang Wang, Yong Xue, Jianqin Wang, Chaolin Wu,...
« Prev « First page 1562 / 1694 Last » Next »