Sciweavers

1263 search results - page 120 / 253
» A Scalable Algorithm for Answering Queries Using Views
Sort
View
113
Voted
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 9 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
129
Voted
CIKM
2005
Springer
15 years 9 months ago
Novelty detection based on sentence level patterns
The detection of new information in a document stream is an important component of many potential applications. In this paper, a new novelty detection approach based on the identi...
Xiaoyan Li, W. Bruce Croft
122
Voted
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
15 years 10 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki
149
Voted
CIKM
2008
Springer
15 years 5 months ago
CE2: towards a large scale hybrid search engine with integrated ranking support
The Web contains a large amount of documents and increasingly, also semantic data in the form of RDF triples. Many of these triples are annotations that are associated with docume...
Haofen Wang, Thanh Tran, Chang Liu
107
Voted
ICPR
2002
IEEE
16 years 4 months ago
Hierarchical Monitoring of People's Behaviors in Complex Environments Using Multiple Cameras
We present a distributed, surveillance system that works in large and complex indoor environments. To track and recognize behaviors of people, we propose the use of the Hidden Mar...
Nam Thanh Nguyen, Svetha Venkatesh, Geoff A. W. We...