Sciweavers

1743 search results - page 303 / 349
» Design and Evaluation of a Knowledge Management System
Sort
View
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
15 years 10 months ago
Canonicalization of database records using adaptive similarity measures
It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
SIGMOD
2004
ACM
163views Database» more  SIGMOD 2004»
15 years 10 months ago
Rank-aware Query Optimization
Ranking is an important property that needs to be fully supported by current relational query engines. Recently, several rank-join query operators have been proposed based on rank...
Ihab F. Ilyas, Rahul Shah, Walid G. Aref, Jeffrey ...
SACMAT
2009
ACM
15 years 4 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
SIGCOMM
2004
ACM
15 years 3 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
CTW
2006
112views more  CTW 2006»
14 years 10 months ago
Cross border railway operations: improving safety at cultural interfaces
Organizations with different cultures will be increasingly required to interface with each other as legislation is introduced to ensure the interoperability of railway systems acr...
S. O. Johnsen, J. Vatn, R. Rosness, I. A. Herrera