Sciweavers

3320 search results - page 96 / 664
» Accessibility of the Database Literature
Sort
View
CIKM
2005
Springer
15 years 4 months ago
WAM-Miner: in the search of web access motifs from historical web log data
Existing web usage mining techniques focus only on discovering knowledge based on the statistical measures obtained from the static characteristics of web usage data. They do not ...
Qiankun Zhao, Sourav S. Bhowmick, Le Gruenwald
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 9 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
WEBNET
2000
15 years 21 days ago
Adapting the Web Development Environment for accessible and usable application construction
: Web application accessibility requires the enforcement of a set of rules on the content written or generated with the help of Web Development Environments. W3C Consortium's ...
Elena García Barriocanal, Miguel Áng...
PODS
2004
ACM
98views Database» more  PODS 2004»
15 years 11 months ago
Processing First-Order Queries under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. Given a first-order query Q, the problem is to decide whether there is an equivalent query whi...
Alan Nash, Bertram Ludäscher
EDBT
2004
ACM
155views Database» more  EDBT 2004»
15 years 11 months ago
Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. The problem is to decide whether a given query Q is feasible, i.e., equivalent to an executable...
Alan Nash, Bertram Ludäscher