Sciweavers

8479 search results - page 1339 / 1696
» Data Extraction from Web Data Sources
Sort
View
FGCS
2011
153views more  FGCS 2011»
14 years 11 months ago
Representing distributed systems using the Open Provenance Model
From the World Wide Web to supply chains and scientific simulations, distributed systems are a widely used and important approach to building computational systems. Tracking prov...
Paul T. Groth, Luc Moreau
PVLDB
2010
128views more  PVLDB 2010»
14 years 11 months ago
Searching Workflows with Hierarchical Views
Workflows are prevalent in diverse applications, which can be scientific experiments, business processes, web services, or recipes. With the dramatically growing number of workflo...
Ziyang Liu, Qihong Shao, Yi Chen
127
Voted
PODS
2002
ACM
98views Database» more  PODS 2002»
16 years 4 months ago
On Propagation of Deletions and Annotations Through Views
We study two classes of view update problems in relational databases. We are given a source database S, a monotone query Q, and the view Q(S) generated by the query. The first pro...
Peter Buneman, Sanjeev Khanna, Wang Chiew Tan
152
Voted
BIBM
2008
IEEE
107views Bioinformatics» more  BIBM 2008»
15 years 11 months ago
A Functional Network of Yeast Genes Using Gene Ontology Information
In the post-genomic era, the organization of genes into networks has played an important role in characterizing the functions of individual genes and the interplay between them. I...
Erliang Zeng, Giri Narasimhan, Lisa Schneper, Kala...
VIZSEC
2005
Springer
15 years 10 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
« Prev « First page 1339 / 1696 Last » Next »