Interactive data exploration with smart drill-down | 9 | 0.47 | 2016 |
Crowd-powered find algorithms. | 4 | 0.40 | 2014 |
Reprint of: Efficient crawling through URL ordering | 1 | 0.36 | 2012 |
Max algorithms in crowdsourcing environments | 57 | 1.72 | 2012 |
Deco: declarative crowdsourcing | 58 | 1.86 | 2012 |
Recommendation systems with complex constraints: A course recommendation perspective | 52 | 1.57 | 2011 |
Peer-to-Peer Data Management | 2 | 0.45 | 2011 |
Human-assisted graph search: it's okay to ask questions | 76 | 4.23 | 2011 |
Evaluating, combining and generalizing recommendations with prerequisites | 16 | 0.74 | 2010 |
Generic entity resolution with negative rules | 22 | 0.99 | 2009 |
Flexible Recommendations for Course Planning | 5 | 0.54 | 2009 |
Social sites research through CourseRank | 3 | 0.48 | 2009 |
Recommendations with prerequisites | 9 | 0.68 | 2009 |
Tagging with Queries: How and Why? | 7 | 0.56 | 2009 |
Simrank++: query rewriting through link analysis of the clickgraph (poster) | 8 | 0.53 | 2008 |
Predictive Pricing and Revenue Sharing | 1 | 0.40 | 2008 |
Can social bookmarking improve web search? | 254 | 11.62 | 2008 |
Photospread: a spreadsheet for managing photos | 13 | 0.67 | 2008 |
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management | 2 | 0.46 | 2008 |
Web graph similarity for anomaly detection (poster) | 6 | 0.63 | 2008 |
Simrank++: query rewriting through link analysis of the click graph | 110 | 3.55 | 2007 |
How To Safeguard Your Sensitive Data | 5 | 0.65 | 2006 |
Generic Entity Resolution in the SERF Project | 17 | 1.85 | 2006 |
Link Spam Alliances | 66 | 6.39 | 2005 |
Two Can Keep A Secret: A Distributed Architecture for Secure Database Services | 128 | 5.35 | 2005 |
Handling data quality in entity resolution | 1 | 0.35 | 2005 |
Ad Hoc, self-supervising peer-to-peer search networks | 23 | 1.27 | 2005 |
Quantifying Agent Strategies under Reputation | 1 | 0.36 | 2005 |
Dewey Meets Turing: Librarians, Computer Scientists, and the Digital Libraries Initiative | 1 | 0.34 | 2005 |
Efficient Queries in Peer-to-Peer Systems | 0 | 0.34 | 2005 |
Canon in G Major: Designing DHTs with Hierarchical Structure | 92 | 27.89 | 2004 |
Context data in geo-referenced digital photo collections | 110 | 6.62 | 2004 |
Combating Web Spam with TrustRank | 561 | 36.49 | 2004 |
Publish/subscribe in a mobile environment | 144 | 14.51 | 2004 |
Online Balancing of Range-Partitioned Data with Applications to Peer-to-Peer Systems | 157 | 6.43 | 2004 |
YAPPERS: a peer-to-peer lookup service over arbitrary topology | 46 | 3.03 | 2003 |
PPay: micropayments for peer-to-peer systems | 110 | 7.87 | 2003 |
Publish/Subscribe Tree Construction in Wireless Ad-Hoc Networks | 61 | 4.64 | 2003 |
Adaptive algorithms for set containment joins | 38 | 1.95 | 2003 |
Extracting structured data from Web pages | 394 | 16.28 | 2003 |
Complex queries over web repositories | 16 | 1.42 | 2003 |
Query-flood DoS attacks in gnutella | 47 | 4.24 | 2002 |
Bidding for Storage Space in a Peer-to-Peer Data Preservation System | 17 | 1.74 | 2002 |
Divide-and-Conquer Algorithm for Computing Set Containment Joins | 11 | 0.67 | 2002 |
Multicasting a Web Repository | 2 | 0.40 | 2001 |
Comparing Hybrid Peer-to-Peer Systems | 119 | 22.80 | 2001 |
Integrating Diverse Information Management Systems: A Brief Survey | 17 | 1.37 | 2001 |
Performance Issues in Incremental Warehouse Maintenance | 52 | 3.34 | 2000 |
GlOSS: text-source discovery over the Internet | 191 | 48.79 | 1999 |
MEDIC: A Memory & Disk Cache for Multimedia Clients | 5 | 0.44 | 1999 |