Sciweavers

1497 search results - page 130 / 300
» Constraint Databases: A Survey
Sort
View
SIGMOD
2011
ACM
270views Database» more  SIGMOD 2011»
14 years 24 days ago
Automatic discovery of attributes in relational databases
In this work we design algorithms for clustering relational columns into attributes, i.e., for identifying strong relationships between columns based on the common properties and ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
70
Voted
ICSE
2003
IEEE-ACM
15 years 10 months ago
Integration of Usability Techniques into the Software Development Process
Software development organisations are paying more and more attention to the usability of their software products. To raise the usability level of the software product, it is nece...
Xavier Ferré
ESORICS
2009
Springer
15 years 4 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
NORDICHI
2004
ACM
15 years 3 months ago
Breaking affordance: culture as context
The concept of affordance as it applies to user interface design is widely used and accepted; possibly overused. This paper explores one of the constraints on affordance: culture....
Lidia Oshlyansky, Harold W. Thimbleby, Paul A. Cai...
GD
1997
Springer
15 years 2 months ago
Implementing a General-Purpose Edge Router
Although routing is a well-studied problem in various contexts, there remain unsolved problems in routing edges for graph layouts. In contrast with techniques from other domains su...
David P. Dobkin, Emden R. Gansner, Eleftherios Kou...