Sciweavers

889 search results - page 154 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
ICRA
2005
IEEE
138views Robotics» more  ICRA 2005»
15 years 3 months ago
Urban Object Recognition from Informative Local Features
Abstract— Autonomous mobile agents require object recognition for high level interpretation and localization in complex scenes. In urban environments, recognition of buildings mi...
Gerald Fritz, Christin Seifert, Lucas Paletta
SIGMOD
1997
ACM
131views Database» more  SIGMOD 1997»
15 years 1 months ago
Maintenance of Data Cubes and Summary Tables in a Warehouse
Data warehouses contain large amounts of information, often collected from a variety of independent sources. Decision-support functions in a warehouse, such as on-line analytical ...
Inderpal Singh Mumick, Dallan Quass, Barinderpal S...
WWW
2003
ACM
15 years 10 months ago
On deep annotation
The success of the Semantic Web crucially depends on the easy creation, integration and use of semantic data. For this purpose, we consider an integration scenario that defies cor...
Siegfried Handschuh, Steffen Staab, Raphael Volz
96
Voted
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
15 years 10 months ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King
88
Voted
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 3 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen