Sciweavers

1061 search results - page 133 / 213
» Co-authoring with structured annotations
Sort
View
KES
2007
Springer
15 years 5 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
PKDD
2007
Springer
120views Data Mining» more  PKDD 2007»
15 years 5 months ago
Site-Independent Template-Block Detection
Detection of template and noise blocks in web pages is an important step in improving the performance of information retrieval and content extraction. Of the many approaches propos...
Aleksander Kolcz, Wen-tau Yih
VIZSEC
2007
Springer
15 years 5 months ago
Visual Analysis of Network Flow Data with Timelines and Event Plots
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
Doantam Phan, J. Gerth, M. Lee, Andreas Paepcke, T...
ICDM
2006
IEEE
122views Data Mining» more  ICDM 2006»
15 years 5 months ago
Optimal Segmentation Using Tree Models
Sequence data are abundant in application areas such as computational biology, environmental sciences, and telecommunications. Many real-life sequences have a strong segmental str...
Robert Gwadera, Aristides Gionis, Heikki Mannila
ICSM
2006
IEEE
15 years 5 months ago
Reverse Engineering Method Stereotypes
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...