Sciweavers

889 search results - page 111 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
IJVR
2008
118views more  IJVR 2008»
14 years 9 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 1 months ago
Efficient top-k count queries over imprecise duplicates
We propose efficient techniques for processing various TopK count queries on data with noisy duplicates. Our method differs from existing work on duplicate elimination in two sign...
Sunita Sarawagi, Vinay S. Deshpande, Sourabh Kasli...
LREC
2010
166views Education» more  LREC 2010»
14 years 11 months ago
Corpora for Automatically Learning to Map Natural Language Questions into SQL Queries
Automatically translating natural language into machine-readable instructions is one of major interesting and challenging tasks in Natural Language (NL) Processing. This problem c...
Alessandra Giordani, Alessandro Moschitti
MOBIDE
2003
ACM
15 years 3 months ago
Consistency mechanisms for a distributed lookup service supporting mobile applications
This paper presents a general-purpose distributed lookup service, denoted Passive Distributed Indexing (PDI). PDI stores entries in form of (key, value) pairs in index caches loca...
Christoph Lindemann, Oliver P. Waldhorst
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
15 years 3 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...