Sciweavers

1298 search results - page 209 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
146
Voted
DEXA
2011
Springer
263views Database» more  DEXA 2011»
14 years 3 months ago
Sampling the National Deep Web
A huge portion of today’s Web consists of web pages filled with information from myriads of online databases. This part of the Web, known as the deep Web, is to date relatively ...
Denis Shestakov
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
16 years 4 months ago
Automatically Extracting Form Labels
We describe a machine-learning-based approach for extracting attribute labels from Web form interfaces. Having these labels is a requirement for several techniques that attempt to ...
Hoa Nguyen, Eun Yong Kang, Juliana Freire
INFOVIS
2005
IEEE
15 years 9 months ago
Flow Map Layout
Cartographers have long used flow maps to show the movement of objects from one location to another, such as the number of people in a migration, the amount of goods being traded,...
Doantam Phan, Ling Xiao, Ron B. Yeh, Pat Hanrahan,...
140
Voted
CF
2004
ACM
15 years 8 months ago
Improving the execution time of global communication operations
Many parallel applications from scientific computing use MPI global communication operations to collect or distribute data. Since the execution times of these communication opera...
Matthias Kühnemann, Thomas Rauber, Gudula R&u...
SIGIR
2009
ACM
15 years 9 months ago
Compressing term positions in web indexes
Large search engines process thousands of queries per second on billions of pages, making query processing a major factor in their operating costs. This has led to a lot of resear...
Hao Yan, Shuai Ding, Torsten Suel