Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Query-Graph'
Query-Graph published presentations and documents on DocSlides.
SharePoint Search – Crawl and
by giovanna-bartolotta
Content . C. onfiguration. Steve Peschka. Sr. Pri...
Corsica’s Seaweeds Valorization
by danika-pritchard
Competitive. Intelligence. University. of . Cor...
Search Engine Architecture
by pasty-toler
Hongning. Wang. CS@UVa. Classical search engine ...
Geo-distributed Data Analytics
by celsa-spraggs
Qifan Pu, Ganesh . Ananthanarayanan. , Peter . Bo...
Spanner : Becoming a SQL
by mitsue-stanley
System. David F. Bacon et al. . Google, Inc. . Pr...
Financial Management Information System (FMIS)
by test
User Training Session. Training Overview. Data Av...
CodeExchange Supporting Reformulation of Internet-Scale Code Queries in Context
by tatyana-admore
Lee . Martie. , Thomas D. . LaToza. , and André ...
Using Large Scale Log Analysis to Understand Human Behavior
by tatiana-dople
Jaime . Teevan. , Microsoft . Reseach. JITP 2011....
Probabilistic Data Management
by yoshiko-marsland
Chapter 3: Probabilistic Query Answering (1). 2. ...
If a user is unable to save a query when choosing the Excel with Headers file type
by mitsue-stanley
(e.g. ., . FMIS times out and exits while waitin...
Hinrich Schütze and Christina
by calandra-battersby
Lioma. Lecture 3: Dictionaries and tolerant retri...
Yuqing Wu, Dirk Van Gucht Indiana University
by karlyn-bohler
Marc Gyssens Hasselt University. Jan Paredaen...
David Walker Princeton University
by danika-pritchard
Joint work with Nate Foster, Michael J. Freedman...
Cache –Warming Strategies for Analysis Services 2008
by kittie-lecroy
Chris Webb. Crossjoin. . Consulting Limited. chr...
A Task-based Framework for
by conchita-marotz
User Behavior Modeling and Search Personalization...
Mathematics and computation behind BLAST and FASTA
by danika-pritchard
Xuhua Xia. xxia@uottawa.ca. http://dambe.bio.uott...
Spelling Correction for Advertising:
by mitsue-stanley
How “Noise” Can Help. Silviu. . Cucerzan. Mi...
Search Engines Information Retrieval in Practice
by jane-oiler
All slides ©Addison Wesley, 2008. Information Ne...
Managing Deepwater Horizon Natural Resource Damage Assessment Environmental Data
by stefany-barnette
2017 NOAA . Environmental Data Management Worksho...
S earch Strategies Session 7
by calandra-battersby
INST 301. Introduction to Information Science. Th...
Robots at MySpace Scaling a .NET Website with Microsoft Robotic Studio
by conchita-marotz
Erik Nelson . Group Architect / enelson@myspace...
Advanced Search Features
by conchita-marotz
Dr. Susan Gauch. Pruning Search Results. If a que...
Foundations of Privacy Lecture
by phoebe-click
5. Lecturer:. . Moni. Naor. Desirable Propertie...
CrowdLogging : Distributed, private, and anonymous search logging
by marina-yarberry
Henry Feild. James Allan. Joshua . Glatt. Center ...
ICD-10 Updates & review
by alida-meadow
Icd-10-cm/pcs changes ahead!. Ensure you validate...
Patterns for Slick database applications
by alida-meadow
Jan Christopher . Vogt, . EPFL. Slick Team. #. sc...
Charter Item on IGMP/MLD Tuning
by yoshiko-marsland
Chairs. IETF 79. 1. IGMP/MLD tuning milestone. Ar...
Indexing & querying text
by mitsue-stanley
September 2017. Pierre-Edouard Portier. http://. ...
Approximating Complex
by luanne-stotts
Ad-hoc. BigData Queries. Srikanth Kandula. , Ani...
Orthogonal Range Searching and Range Trees
by alexa-scheidler
Computational Geometry (EECS 396/496) – October...
DBMS Architecture COMP3211 Advanced Databases
by cheryl-pisano
Dr. Nicholas Gibbins – . nmg@ecs.soton.ac.uk. ...
Named Entity Recognition in Query
by karlyn-bohler
Jiafeng Guo. 1. , . Gu. Xu. 2. , . Xueqi. Cheng...
LINQ Jim Fawcett CSE681 – Software Modeling and Analysis
by test
Fall 2016. References. C# 6.0 in a Nutshell, 6. ...
Annotated XML: Queries and Provenance
by karlyn-bohler
Nate Foster . T.J. Green. Val Tannen. ...
SourceRank : Relevance and Trust Assessment for Deep Web Sources Based on Inter-Source Agreement
by sherrill-nordquist
Raju. . Balakrishnan. , . Subbarao. . Kambhamp...
Querying Encrypted Data using Fully
by tawny-fly
Homomorphic. Encryption. Murali. Mani, . UMFlin...
How LINQ Works: A Deep Dive into the Microsoft Visual Basic and C# Implementations
by celsa-spraggs
Luke Hoban . Senior Program Manager. Microsoft. S...
Compiling Network Path Queries
by stefany-barnette
Srinivas Narayana. Princeton University. Network ...
Declarative Network Path Queries
by yoshiko-marsland
Srinivas Narayana. May 13, 2016. Advisor: Prof. J...
Information Retrieval with Time Series Query
by conchita-marotz
Hyun . Duk. . Kim (now at Twitter) , . Danila. ...
Load More...