• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,610
Next 10 →

The Lumière Project: Bayesian User Modeling for Inferring the Goals and Needs of Software Users

by Eric Horvitz, Jack Breese, David Heckerman, David Hovel, Koos Rommelse - In Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence , 1998
"... The Lumi`ere Project centers on harnessing probability and utility to provide assistance to computer software users. We review work on Bayesian user models that can be employed to infer a user's needs by considering a user's background, actions, and queries. Several problems were tackled i ..."
Abstract - Cited by 393 (18 self) - Add to MetaCart
The Lumi`ere Project centers on harnessing probability and utility to provide assistance to computer software users. We review work on Bayesian user models that can be employed to infer a user's needs by considering a user's background, actions, and queries. Several problems were tackled

Using COTS Search Engines and Custom Query Strategies at CLEF. Cross-Language Evaluation Forum CLEF

by David Nadeau, Mario Jarmasz, Caroline Barrière, George Foster, Claude St-jacques - Working Notes for the CLEF 2004 Workshop , 2004
"... Abstract. This paper presents a system for bilingual information retrieval using commercial off-the-shelf search engines (COTS). Several custom query construction, expansion and translation strategies are compared. We present the experiments and the corresponding results for the CLEF 2004 event. 1 ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Abstract. This paper presents a system for bilingual information retrieval using commercial off-the-shelf search engines (COTS). Several custom query construction, expansion and translation strategies are compared. We present the experiments and the corresponding results for the CLEF 2004 event. 1

Improved Histograms for Selectivity Estimation of Range Predicates

by Viswanath Poosala, Peter J. Haas, Yannis E. Ioannidis, Eugene J. Shekita , 1996
"... Many commercial database systems maintain histograms to summarize the contents of relations and permit efficient estimation of query result sizes and access plan costs. Although several types of histograms have been proposed in the past, there has never been a systematic study of all histogram aspec ..."
Abstract - Cited by 276 (20 self) - Add to MetaCart
Many commercial database systems maintain histograms to summarize the contents of relations and permit efficient estimation of query result sizes and access plan costs. Although several types of histograms have been proposed in the past, there has never been a systematic study of all histogram

Hive- A Warehousing Solution Over a Map-Reduce Framework

by Ashish Thusoo, Joydeep Sen Sarma, Namit Jain, Zheng Shao, Prasad Chakka, Suresh Anthony, Hao Liu, Pete Wyckoff, Raghotham Murthy - IN VLDB '09: PROCEEDINGS OF THE VLDB ENDOWMENT , 2009
"... The size of data sets being collected and analyzed in the industry for business intelligence is growing rapidly, mak- ing traditional warehousing solutions prohibitively expen- sive. Hadoop [3] is a popular open-source map-reduce im- plementation which is being used as an alternative to store and pr ..."
Abstract - Cited by 265 (1 self) - Add to MetaCart
. Hive supports queries expressed in a SQL-like declarative language - HiveQL, which are compiled into map-reduce jobs executed on Hadoop. In addition, HiveQL supports custom map-reduce scripts to be plugged into queries. The language includes a type sys- tem with support for tables containing primitive

Finding similar files in a large file system

by Udi Manber, Udi Manber - in Proceedings of the USENIX Winter 1994 Technical Conference , 1994
"... We present a tool, called sif, for finding all similar files in a large file system. Files are considered similar if they have significant number of common pieces, even if they are very different otherwise. For example, one file may be contained, possibly with some changes, in another file, or a fil ..."
Abstract - Cited by 260 (3 self) - Add to MetaCart
file may be a reorganization of another file. The run-ning time for finding all groups of similar files, even for as little as 25 % similarity, is on the order of 500MB to 1GB an hour. The amount of similarity and several other customized parameters can be determined by the user at a post

The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries

by Yufei Tao, Dimitris Papadias, Jimeng Sun - In VLDB , 2003
"... A predictive spatio-temporal query retrieves the set of moving objects that will intersect a query window during a future time interval. Currently, the only access method for processing such queries in practice is the TPR-tree. In this paper we first perform an analysis to determine the factor ..."
Abstract - Cited by 191 (10 self) - Add to MetaCart
the factors that affect the performance of predictive queries and show that several of these factors are not considered by the TPR-tree, which uses the insertion/deletion algorithms of the R*-tree designed for static data. Motivated by this, we propose a new index structure called the TPR*- tree, which

Searchable symmetric encryption: improved definitions and efficient constructions

by Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky - Proceedings of the 13th ACM conference on Computer and communications security, CCS ’06, ACM , 2006
"... Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have been ..."
Abstract - Cited by 187 (7 self) - Add to MetaCart
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have

Assessing the Effects of Quality, Value, and Customer Satisfaction on Consumer Behavioral Intentions in Service Environments

by J. Joseph Cronin, Michael K. Brady, G. Tomas, M. Hult
"... The following study both synthesizes and builds on the efforts to conceptualize the effects of quality, satisfaction, and value on consumers ’ behavioral intentions. Specifically, it reports an empirical assessment of a model of service encounters that simultaneously considers the direct effects of ..."
Abstract - Cited by 183 (0 self) - Add to MetaCart
of these variables on behavioral intentions. The study builds on recent advances in services marketing theory and assesses the relationships between the identified constructs across multiple service industries. Several competing theories are also considered and compared to the research model. A number of notable

Precise analysis of string expressions

by Aske Simon Christensen, Anders Møller, Michael I. Schwartzbach - In Proc. 10th International Static Analysis Symposium, SAS ’03, volume 2694 of LNCS , 2003
"... We perform static analysis of Java programs to answer a simple question: which values may occur as results of string expressions? The answers are summarized for each expression by a regular language that is guaranteed to contain all possible values. We present several applications of this analysis, ..."
Abstract - Cited by 221 (18 self) - Add to MetaCart
, including statically checking the syntax of dynamically generated expressions, such as SQL queries. Our analysis constructs flow graphs from class files and generates a context-free grammar with a nonterminal for each string expression. The language of this grammar is then widened into a regular language

The UCSC table browser data retrieval tool

by Donna Karolchik, Angela S. Hinrichs, Terrence S. Furey, Krishna M. Roskin, Charles W. Sugnet, David Haussler, W. James Kent - Nucleic Acids Res , 2004
"... hgText) provides text-based access to a large collection of genome assemblies and annotation data stored in the Genome Browser Database. A ¯exible alternative to the graphical-based Genome Browser, this tool offers an enhanced level of query support that includes restrictions based on ®eld values, f ..."
Abstract - Cited by 187 (18 self) - Add to MetaCart
be uploaded into the Genome Browser as custom annotation tracks. The Table Browser User's Guide located on the UCSC website provides instructions and detailed examples for constructing queries and con®guring output.
Next 10 →
Results 1 - 10 of 1,610
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University