Sciweavers

1527 search results - page 256 / 306
» Data Integration by Describing Sources with Constraint Datab...
Sort
View
144
Voted
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
ICDE
2003
IEEE
209views Database» more  ICDE 2003»
16 years 5 months ago
An Evaluation of Regular Path Expressions with Qualifiers against XML Streams
This paper presents SPEX, a streamed and progressive evaluation of regular path expressions with XPath-like qualifiers against XML streams. SPEX proceeds as follows. An expression...
Dan Olteanu, François Bry, Tobias Kiesling
173
Voted
BMCBI
2006
128views more  BMCBI 2006»
15 years 3 months ago
Model-driven user interfaces for bioinformatics data resources: regenerating the wheel as an alternative to reinventing it
Background: The proliferation of data repositories in bioinformatics has resulted in the development of numerous interfaces that allow scientists to browse, search and analyse the...
Kevin L. Garwood, Christopher Garwood, Cornelia He...
269
Voted
ICDE
2009
IEEE
214views Database» more  ICDE 2009»
16 years 5 months ago
Ranking with Uncertain Scores
Large databases with uncertain information are becoming more common in many applications including data integration, location tracking, and Web search. In these applications, ranki...
Mohamed A. Soliman, Ihab F. Ilyas
ICDE
2008
IEEE
152views Database» more  ICDE 2008»
16 years 5 months ago
Muse: Mapping Understanding and deSign by Example
A fundamental problem in information integration is that of designing the relationships, called schema mappings, between two schemas. The specification of a semantically correct sc...
Bogdan Alexe, Laura Chiticariu, Renée J. Mi...