Sciweavers

313 search results - page 52 / 63
» Web Search Engines: Part 1
Sort
View
BMCBI
2010
91views more  BMCBI 2010»
14 years 9 months ago
Ranked retrieval of Computational Biology models
Background: The study of biological systems demands computational support. If targeting a biological problem, the reuse of existing computational models can save time and effort. ...
Ron Henkel, Lukas Endler, Andre Peters, Nicolas Le...
ALENEX
2009
191views Algorithms» more  ALENEX 2009»
14 years 10 months ago
Theory and Practise of Monotone Minimal Perfect Hashing
Minimal perfect hash functions have been shown to be useful to compress data in several data management tasks. In particular, order-preserving minimal perfect hash functions [10] ...
Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Seba...
CIKM
2007
Springer
15 years 3 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
SIGCSE
2006
ACM
127views Education» more  SIGCSE 2006»
15 years 3 months ago
SNITCH: a software tool for detecting cut and paste plagiarism
Plagiarism of material from the Internet is a widespread and growing problem. Computer science students, and those in other science and engineering courses, can sometimes get away...
Sebastian Niezgoda, Thomas P. Way
EL
2010
172views more  EL 2010»
14 years 8 months ago
Computer literacy skills of librarians: a case study of Isfahan University libraries, Iran
We live in a computer-centric information age. The number of computers in-use including in libraries is growing rapidly. Computer literacy, which is the ability to operate a compu...
Hajar Safahieh, Asefeh Asemi