Sciweavers

6660 search results - page 1070 / 1332
» Data Analysis for Query Processing
Sort
View
135
Voted
SACMAT
2004
ACM
15 years 9 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
124
Voted
CIKM
2004
Springer
15 years 9 months ago
Evaluating window joins over punctuated streams
We explore join optimizations in the presence of both timebased constraints (sliding windows) and value-based constraints (punctuations). We present the first join solution named...
Luping Ding, Elke A. Rundensteiner
130
Voted
IJCNLP
2004
Springer
15 years 9 months ago
Chinese Treebanks and Grammar Extraction
Preparation of knowledge bank is a very difficult task. In this paper, we discuss the knowledge extraction from the manually examined Sinica Treebank. Categorical information, wor...
Keh-Jiann Chen, Yu-Ming Hsieh
116
Voted
EDBTW
2010
Springer
15 years 8 months ago
Declarative scheduling in highly scalable systems
In modern architectures based on Web Services or Cloud Computing, a very large number of user requests arrive concurrently and has to be scheduled for execution constrained by cor...
Christian Tilgner
99
Voted
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
15 years 8 months ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...
« Prev « First page 1070 / 1332 Last » Next »