Sciweavers

1186 search results - page 139 / 238
» A New Approach to Secure Logging
Sort
View
ICDE
2008
IEEE
171views Database» more  ICDE 2008»
16 years 2 months ago
Usage-Based Schema Matching
Existing techniques for schema matching are classified as either schema-based, instance-based, or a combination of both. In this paper, we define a new class of techniques, called ...
Hazem Elmeleegy, Mourad Ouzzani, Ahmed K. Elmagarm...
100
Voted
KDD
2005
ACM
177views Data Mining» more  KDD 2005»
16 years 1 months ago
Query chains: learning to rank from implicit feedback
This paper presents a novel approach for using clickthrough data to learn ranked retrieval functions for web search results. We observe that users searching the web often perform ...
Filip Radlinski, Thorsten Joachims
97
Voted
EDBT
2009
ACM
124views Database» more  EDBT 2009»
15 years 7 months ago
A sequential indexing scheme for flash-based embedded systems
NAND Flash has become the most popular stable storage medium for embedded systems. As on-board storage capacity increases, the need for efficient indexing techniques arises. Such ...
Shaoyi Yin, Philippe Pucheral, Xiaofeng Meng
CIVR
2009
Springer
131views Image Analysis» more  CIVR 2009»
15 years 7 months ago
Supporting aspect-based video browsing: analysis of a user study
In this paper, we present a novel video search interface based on the concept of aspect browsing. The proposed strategy is to assist the user in exploratory video search by active...
Thierry Urruty, Frank Hopfgartner, David Hannah, D...
117
Voted
ICSOC
2007
Springer
15 years 7 months ago
Let It Flow: Building Mashups with Data Processing Pipelines
Mashups are a new kind of interactive Web application, built out of the composition of two or more existing Web service APIs and data sources. Whereas “pure” mashups are built ...
Biörn Biörnstad, Cesare Pautasso