ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Public health
Computing
Library and Museology
Computing
Research
Education
Literature
Pure sciences
History
all records (55)

Languages
English
Spanish
French

Countries
USA
Indonesia
Canada
Switzerland
Ukraine
Brazil
United Kingdom
Denmark
India
Austria
all records (44)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
537  Articles
1 of 55 pages  |  10  records  |  more records»
The mobile technology revolutionizes the world of communications opening up new possibilities for applications such as location based web search. It involves retrieving the user point of interest (POI) from the web documents based on the query relative to... see more

When developing an automated FAQ retrieval system, the information supplier constructs question candidates in advance using their own knowledge. Then they answer these question candidates to create question-answer pairs to use in the FAQ retrieval system.... see more

Source code retrieval is a branch of text retrieval which helps developer find a piece of code from the code base. The developer can obtain the required code from the code base by issuing a query on the source code base. Generally, a developer who has bee... see more

The skyline query processing problem has been well studied for many years. The literature on skyline algorithms so far mainly considers static query points on static attributes. With the popular usage of mobile devices along with the increasing number of ... see more

A query is a syntax or command used in a database system to access and display data. Queries can be used to make data interact with each other. To display query results in the database, of course, requires execution time which is usually denoted in second... see more

We investigate two types of query games played on a graph, pair queries and edge queries. We concentrate on investigating the two associated graph parameters for binomial random graphs, and showing that determining any of the two parameters is NP-hard for... see more

Attacks on network security can happen anywhere. Using Geo-Social Networks (GSN), i.e., a graph that combines social network data and spatial information, we can find the potential attackers based on the given location. In answering the graph-based proble... see more

Querying nested data has become one of the most challenging issues for retrieving desired information from the Web. Today diverse applications generate a tremendous amount of data in different formats. These data and information exchanged on the Web are c... see more

We show how to preprocess a polygonal domain with a fixed starting point s in order to answer efficiently the following queries: Given a point q, how should one move from s in order to see q as soon as possible? This query resembles the well-known shortes... see more

1 of 55 pages  |  10  records  |  more records»