Sciweavers

5130 search results - page 1010 / 1026
» Constraint Query Languages
Sort
View
105
Voted
IMCS
2007
144views more  IMCS 2007»
15 years 17 days ago
On the imbalance of the security problem space and its expected consequences
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
Konstantin Beznosov, Olga Beznosova
100
Voted
GIS
2002
ACM
15 years 13 days ago
Design of field wrappers for mobile field data collection
In mobile field data collection, data gatherer requires to get geospatial information service to support in navigating to the right locations, describing context of observed objec...
Peisheng Zhao, Sarah Nusser, Leslie L. Miller
110
Voted
TKDE
2002
91views more  TKDE 2002»
15 years 9 days ago
The EVE Approach: View Synchronization in Dynamic Distributed Environments
The construction and maintenance of data warehouses (views) in large-scale environments composed of numerous distributed and evolving information sources (ISs) such as the WWW has ...
Amy J. Lee, Anisoara Nica, Elke A. Rundensteiner
104
Voted
VLDB
2002
ACM
131views Database» more  VLDB 2002»
15 years 9 days ago
ProTDB: Probabilistic Data in XML
Whereas traditional databases manage only deterministic information, many applications that use databases involve uncertain data. This paper presents a Probabilistic Tree Data Bas...
Andrew Nierman, H. V. Jagadish
PVLDB
2008
124views more  PVLDB 2008»
15 years 4 days ago
Google's Deep Web crawl
The Deep Web, i.e., content hidden behind HTML forms, has long been acknowledged as a significant gap in search engine coverage. Since it represents a large portion of the structu...
Jayant Madhavan, David Ko, Lucja Kot, Vignesh Gana...
« Prev « First page 1010 / 1026 Last » Next »