Sciweavers

232 search results - page 46 / 47
» Query-related data extraction of hidden web documents
Sort
View
CAV
2011
Springer
253views Hardware» more  CAV 2011»
12 years 9 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
WWW
2002
ACM
14 years 6 months ago
Probabilistic query expansion using query logs
Query expansion has long been suggested as an effective way to resolve the short query and word mismatching problems. A number of query expansion methods have been proposed in tra...
Hang Cui, Ji-Rong Wen, Jian-Yun Nie, Wei-Ying Ma
MKWI
2008
136views Business» more  MKWI 2008»
13 years 7 months ago
KASIMIR - Work process embedded task management leveraging the Semantic Desktop
: The effectiveness of semantic applications can be increased significantly if the system does not urge the users to take care of explicit semantic annotation creation. Today, sema...
Olaf Grebner, Ernie Ong, Uwe V. Riss
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
14 years 5 months ago
To search or to crawl?: towards a query optimizer for text-centric tasks
Text is ubiquitous and, not surprisingly, many important applications rely on textual data for a variety of tasks. As a notable example, information extraction applications derive...
Panagiotis G. Ipeirotis, Eugene Agichtein, Pranay ...
QEST
2009
IEEE
14 years 8 days ago
Recent Extensions to Traviando
—Traviando is a trace analyzer and visualizer for simulation traces of discrete event dynamic systems. In this paper, we briefly outline recent extensions of Traviando towards a...
Peter Kemper