Search Results for ''

published presentations and documents on DocSlides.

Enhancing Web Search by Promoting Multiple Engine Use
Enhancing Web Search by Promoting Multiple Engine Use
by kittie-lecroy
Ryen W. . White, Matthew Richardson, Mikhail Bile...
Using Large Scale Log Analysis to Understand Human Behavior
Using Large Scale Log Analysis to Understand Human Behavior
by natalia-silvester
Jaime . Teevan. , Microsoft . Reseach. dub 2013. ...
Keyword Query Routing
Keyword Query Routing
by kittie-lecroy
Abstract. Keyword search is an intuitive paradigm...
Low Latency Geo-distributed
Low Latency Geo-distributed
by olivia-moreira
Data Analytics. Qifan Pu, Ganesh . Ananthanarayan...
Query-Based Outlier Detection in Heterogeneous Information
Query-Based Outlier Detection in Heterogeneous Information
by calandra-battersby
Jonathan Kuck. 1. , . Honglei. Zhuang. 1. , . Xi...
Section 2:
Section 2:
by tatiana-dople
Finding and . Refinding. Jaime Teevan. Microsoft ...
Crowdsourced Enumeration Queries
Crowdsourced Enumeration Queries
by briana-ranney
Ruihan Shan. Introduction. Motivation. Motivation...
Keyword-based Search and Exploration on Databases
Keyword-based Search and Exploration on Databases
by faustina-dinatale
Yi Chen. Wei Wang. Ziyang. Liu. University of Ne...
Search Engines
Search Engines
by myesha-ticknor
Information Retrieval in Practice. All slides ©A...
Indexing
Indexing
by tawny-fly
The essential step in searching. Review a bit. We...
Hinrich
Hinrich
by test
. Schütze. and Christina . Lioma. Lecture 1: B...
Prolog
Prolog
by mitsue-stanley
An Introduction. Introduction. Prolog (Programmin...
HengHa
HengHa
by ellena-manuel
: . Data Harvesting Detection on Hidden Databases...
Retrieval Models and Ranking Systems
Retrieval Models and Ranking Systems
by olivia-moreira
CSC 575. Intelligent Information Retrieval. Intel...
Hinrich
Hinrich
by celsa-spraggs
. Schütze. and Christina . Lioma. Lecture 3: D...
Information Re-Retrieval
Information Re-Retrieval
by briana-ranney
Repeat Queries in Yahoo’s Logs. Jaime Teevan (M...
Context-Sensitive
Context-Sensitive
by yoshiko-marsland
Query Auto-Completion. WWW 2011 Hyderabad India. ...
Scott Aaronson (MIT)
Scott Aaronson (MIT)
by min-jolicoeur
Andris. . Ambainis. (U. of Latvia). Forrelation...
Indexing Correlated Probabilistic Databases
Indexing Correlated Probabilistic Databases
by pasty-toler
Bhargav Kanagal & Amol Deshpande. University ...
Lecture 1 : Full-text Indexing
Lecture 1 : Full-text Indexing
by faustina-dinatale
楊立偉教授. 台灣科大資管系. wyang@ntu...
Insight gaining from OLAP queries via data movies
Insight gaining from OLAP queries via data movies
by pasty-toler
. . . Dimitrios. . Gkesoulis. *. Panos Vass...
Differential Privacy on Linked Data: Theory and Implementat
Differential Privacy on Linked Data: Theory and Implementat
by stefany-barnette
Yotam. . Aron. Table of Contents. Introduction. ...
Querying Active Directory From
Querying Active Directory From
by briana-ranney
SSRS. To Customize The User Experience And Secure...
Harikrishnan Karunakaran
Harikrishnan Karunakaran
by pamella-moone
Sulabha Balan. ICICLES: Self-tuning Samples for ...
Toward Whole-Session Relevance:
Toward Whole-Session Relevance:
by min-jolicoeur
Exploring . Intrinsic Diversity . in . Web Search...
1 Online Feature Selection for Information Retrieval
1 Online Feature Selection for Information Retrieval
by briana-ranney
Niranjan Balasubramanian. University of Massachus...
CS61A Lecture 27
CS61A Lecture 27
by alida-meadow
Logic Programming. Jom. . Magrotker. UC Berkeley...
Gerhard Weikum
Gerhard Weikum
by trish-goza
Max Planck Institute for Informatics. http://www....
A Lap Around
A Lap Around
by min-jolicoeur
Linq. :. Language Integrated Query. in C#3, Visua...
Cross-Language Retrieval
Cross-Language Retrieval
by tatyana-admore
INST 734. Module 11. Doug . Oard. Agenda. CLIR. D...
Querying Workflow Provenance
Querying Workflow Provenance
by giovanna-bartolotta
Susan B. Davidson. University of Pennsylvania. Jo...
Peeking into the Plan Cache with SQL Server 2008
Peeking into the Plan Cache with SQL Server 2008
by karlyn-bohler
Bob Beauchemin. Developer Skills Partner, . SQLsk...
Optimize
Optimize
by olivia-moreira
Search Relevance in SharePoint 2013 . Victor Poz...
IGMP and MLD Optimization in Wireless and Mobile Networks
IGMP and MLD Optimization in Wireless and Mobile Networks
by lois-ondreau
1. draft-liu-multimob-igmp-mld-wireless-mobile-00...
MS&E 239
MS&E 239
by giovanna-bartolotta
Stanford University. Autumn 2009. Instructors. : ...
Shark:SQL
Shark:SQL
by lois-ondreau
and Rich Analytics at Scale. Presentaed. By. ...
Analytical
Analytical
by tawny-fly
Queries on Road Networks: . An Experimental Evalu...
Search Engines
Search Engines
by min-jolicoeur
Information Retrieval in Practice. All slides ©A...
Spelling correction as an iterative process that exploits t
Spelling correction as an iterative process that exploits t
by mitsue-stanley
Silviu. . Cucerzan. and Eric Brill. July, 2004....
TREC Session Track
TREC Session Track
by yoshiko-marsland
Ben . Carterette. Paul Clough. Evangelos. . Kano...