Results 1 - 10
of
1,610
The Lumière Project: Bayesian User Modeling for Inferring the Goals and Needs of Software Users
- In Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence
, 1998
"... The Lumi`ere Project centers on harnessing probability and utility to provide assistance to computer software users. We review work on Bayesian user models that can be employed to infer a user's needs by considering a user's background, actions, and queries. Several problems were tackled i ..."
Abstract
-
Cited by 393 (18 self)
- Add to MetaCart
The Lumi`ere Project centers on harnessing probability and utility to provide assistance to computer software users. We review work on Bayesian user models that can be employed to infer a user's needs by considering a user's background, actions, and queries. Several problems were tackled
Using COTS Search Engines and Custom Query Strategies at CLEF. Cross-Language Evaluation Forum CLEF
- Working Notes for the CLEF 2004 Workshop
, 2004
"... Abstract. This paper presents a system for bilingual information retrieval using commercial off-the-shelf search engines (COTS). Several custom query construction, expansion and translation strategies are compared. We present the experiments and the corresponding results for the CLEF 2004 event. 1 ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Abstract. This paper presents a system for bilingual information retrieval using commercial off-the-shelf search engines (COTS). Several custom query construction, expansion and translation strategies are compared. We present the experiments and the corresponding results for the CLEF 2004 event. 1
Improved Histograms for Selectivity Estimation of Range Predicates
, 1996
"... Many commercial database systems maintain histograms to summarize the contents of relations and permit efficient estimation of query result sizes and access plan costs. Although several types of histograms have been proposed in the past, there has never been a systematic study of all histogram aspec ..."
Abstract
-
Cited by 276 (20 self)
- Add to MetaCart
Many commercial database systems maintain histograms to summarize the contents of relations and permit efficient estimation of query result sizes and access plan costs. Although several types of histograms have been proposed in the past, there has never been a systematic study of all histogram
Hive- A Warehousing Solution Over a Map-Reduce Framework
- IN VLDB '09: PROCEEDINGS OF THE VLDB ENDOWMENT
, 2009
"... The size of data sets being collected and analyzed in the
industry for business intelligence is growing rapidly, mak-
ing traditional warehousing solutions prohibitively expen-
sive. Hadoop [3] is a popular open-source map-reduce im-
plementation which is being used as an alternative to store
and pr ..."
Abstract
-
Cited by 265 (1 self)
- Add to MetaCart
. Hive supports
queries expressed in a SQL-like declarative language - HiveQL,
which are compiled into map-reduce jobs executed on Hadoop.
In addition, HiveQL supports custom map-reduce scripts to
be plugged into queries. The language includes a type sys-
tem with support for tables containing primitive
Finding similar files in a large file system
- in Proceedings of the USENIX Winter 1994 Technical Conference
, 1994
"... We present a tool, called sif, for finding all similar files in a large file system. Files are considered similar if they have significant number of common pieces, even if they are very different otherwise. For example, one file may be contained, possibly with some changes, in another file, or a fil ..."
Abstract
-
Cited by 260 (3 self)
- Add to MetaCart
file may be a reorganization of another file. The run-ning time for finding all groups of similar files, even for as little as 25 % similarity, is on the order of 500MB to 1GB an hour. The amount of similarity and several other customized parameters can be determined by the user at a post
The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries
- In VLDB
, 2003
"... A predictive spatio-temporal query retrieves the set of moving objects that will intersect a query window during a future time interval. Currently, the only access method for processing such queries in practice is the TPR-tree. In this paper we first perform an analysis to determine the factor ..."
Abstract
-
Cited by 191 (10 self)
- Add to MetaCart
the factors that affect the performance of predictive queries and show that several of these factors are not considered by the TPR-tree, which uses the insertion/deletion algorithms of the R*-tree designed for static data. Motivated by this, we propose a new index structure called the TPR*- tree, which
Searchable symmetric encryption: improved definitions and efficient constructions
- Proceedings of the 13th ACM conference on Computer and communications security, CCS ’06, ACM
, 2006
"... Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have been ..."
Abstract
-
Cited by 187 (7 self)
- Add to MetaCart
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have
Assessing the Effects of Quality, Value, and Customer Satisfaction on Consumer Behavioral Intentions in Service Environments
"... The following study both synthesizes and builds on the efforts to conceptualize the effects of quality, satisfaction, and value on consumers ’ behavioral intentions. Specifically, it reports an empirical assessment of a model of service encounters that simultaneously considers the direct effects of ..."
Abstract
-
Cited by 183 (0 self)
- Add to MetaCart
of these variables on behavioral intentions. The study builds on recent advances in services marketing theory and assesses the relationships between the identified constructs across multiple service industries. Several competing theories are also considered and compared to the research model. A number of notable
Precise analysis of string expressions
- In Proc. 10th International Static Analysis Symposium, SAS ’03, volume 2694 of LNCS
, 2003
"... We perform static analysis of Java programs to answer a simple question: which values may occur as results of string expressions? The answers are summarized for each expression by a regular language that is guaranteed to contain all possible values. We present several applications of this analysis, ..."
Abstract
-
Cited by 221 (18 self)
- Add to MetaCart
, including statically checking the syntax of dynamically generated expressions, such as SQL queries. Our analysis constructs flow graphs from class files and generates a context-free grammar with a nonterminal for each string expression. The language of this grammar is then widened into a regular language
The UCSC table browser data retrieval tool
- Nucleic Acids Res
, 2004
"... hgText) provides text-based access to a large collection of genome assemblies and annotation data stored in the Genome Browser Database. A ¯exible alternative to the graphical-based Genome Browser, this tool offers an enhanced level of query support that includes restrictions based on ®eld values, f ..."
Abstract
-
Cited by 187 (18 self)
- Add to MetaCart
be uploaded into the Genome Browser as custom annotation tracks. The Table Browser User's Guide located on the UCSC website provides instructions and detailed examples for constructing queries and con®guring output.
Results 1 - 10
of
1,610