Sciweavers

1346 search results - page 257 / 270
» Data Management and Mining in Internet Ad Systems
Sort
View
88
Voted
WIDM
2003
ACM
15 years 2 months ago
XPath query transformation based on XSLT stylesheets
Whenever XML data must be shared by heterogeneous applications, transformations between different applicationspecific XML formats are necessary. The state-of-the-art method transf...
Sven Groppe, Stefan Böttcher
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 7 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
SIGECOM
2003
ACM
174views ECommerce» more  SIGECOM 2003»
15 years 2 months ago
Collaboration software to reduce inventory and increase response
Some recent trends in business and manufacturing hold the promise of greater profits, yet, due to profit-robbing inventory increases, this promise has not been fully realized. [9]...
Indu Bingham, Barbara Hoefle, Kim Phan, Jim Sizemo...
CIKM
2001
Springer
15 years 2 months ago
X007: Applying 007 Benchmark to XML Query Processing Tool
If XML is to play the critical role of the lingua franca for Internet data interchange that many predict, it is necessary to start designing and adopting benchmarks allowing the c...
Stéphane Bressan, Gillian Dobbie, Zoé...
CONEXT
2009
ACM
14 years 10 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...