Sciweavers

8655 search results - page 386 / 1731
» Challenges for Trusted Computing
Sort
View
134
Voted
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
15 years 8 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
SEMWEB
2009
Springer
15 years 8 months ago
Semantic Web Service Composition in Social Environments
This paper describes how to generate compositions of semantic Web services using social trust information from user ratings of the services. We present a taxonomy of features, suc...
Ugur Kuter, Jennifer Golbeck
SIGUCCS
2000
ACM
15 years 8 months ago
Linux and Open Source in the Academic Enterprise
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...
DIS
2009
Springer
15 years 10 months ago
A Sliding Window Algorithm for Relational Frequent Patterns Mining from Data Streams
Some challenges in frequent pattern mining from data streams are the drift of data distribution and the computational efficiency. In this work an additional challenge is considered...
Fabio Fumarola, Anna Ciampi, Annalisa Appice, Dona...
139
Voted
NAACL
2010
15 years 1 months ago
Generalizing Hierarchical Phrase-based Translation using Rules with Adjacent Nonterminals
Hierarchical phrase-based translation (Hiero, (Chiang, 2005)) provides an attractive framework within which both short- and longdistance reorderings can be addressed consistently ...
Hendra Setiawan, Philip Resnik