Sciweavers

912 search results - page 96 / 183
» Design, Implementation, and Evaluation of a Repairable Datab...
Sort
View
73
Voted
KDD
2004
ACM
114views Data Mining» more  KDD 2004»
16 years 1 months ago
Mining reference tables for automatic text segmentation
Automatically segmenting unstructured text strings into structured records is necessary for importing the information contained in legacy sources and text collections into a data ...
Eugene Agichtein, Venkatesh Ganti
131
Voted
HT
2004
ACM
15 years 6 months ago
Automatic generation of hypertext system repositories: a model driven approach
In this paper, we present a model-driven methodology and toolset for automatic generation of hypertext system repositories. Our code generator, called Bamboo, is based on a Contai...
E. James Whitehead Jr., Guozheng Ge, Kai Pan
HICSS
1997
IEEE
146views Biometrics» more  HICSS 1997»
15 years 5 months ago
Intelligent Agents for Matching Information Providers and Consumers on the World-Wide-Web
In this paper, we discuss the various issues in designing intelligent software systems to assist worldwide-web users in locating relevant information. We identi3 a number of key c...
Joseph K. W. Lee, David Wai-Lok Cheung, Ben Kao, J...
106
Voted
DBSEC
2007
128views Database» more  DBSEC 2007»
15 years 2 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
105
Voted
ER
2009
Springer
166views Database» more  ER 2009»
15 years 7 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone