Sciweavers

255 search results - page 51 / 51
» Structures with Many-Valued Information and Their Relational...
Sort
View
DSS
2007
226views more  DSS 2007»
13 years 5 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
WWW
2003
ACM
14 years 6 months ago
Mining newsgroups using networks arising from social behavior
Recent advances in information retrieval over hyperlinked corpora have convincinglydemonstratedthat links carry less noisy information than text. We investigate the feasibility of...
Rakesh Agrawal, Sridhar Rajagopalan, Ramakrishnan ...
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
14 years 7 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
14 years 5 months ago
To search or to crawl?: towards a query optimizer for text-centric tasks
Text is ubiquitous and, not surprisingly, many important applications rely on textual data for a variety of tasks. As a notable example, information extraction applications derive...
Panagiotis G. Ipeirotis, Eugene Agichtein, Pranay ...
ISR
2010
13 years 3 months ago
Electronic Markets, Search Costs, and Firm Boundaries
We study how electronic markets that facilitate broader inter-firm transactions affect the vertical scope of emerging IT-enabled extended enterprises. We do so by modeling firms...
Ramesh Sankaranarayanan, Arun Sundararajan