Sciweavers

1363 search results - page 250 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
SAC
2009
ACM
15 years 3 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
SIGMOD
2009
ACM
165views Database» more  SIGMOD 2009»
15 years 3 months ago
Query by output
It has recently been asserted that the usability of a database is as important as its capability. Understanding the database schema, the hidden relationships among attributes in t...
Quoc Trung Tran, Chee-Yong Chan, Srinivasan Partha...
CIKM
2009
Springer
15 years 3 months ago
Heterogeneous cross domain ranking in latent space
Traditional ranking mainly focuses on one type of data source, and effective modeling still relies on a sufficiently large number of labeled or supervised examples. However, in m...
Bo Wang, Jie Tang, Wei Fan, Songcan Chen, Zi Yang,...
HUC
2009
Springer
15 years 3 months ago
ViridiScope: design and implementation of a fine grained power monitoring system for homes
A key prerequisite for residential energy conservation is knowing when and where energy is being spent. Unfortunately, the current generation of energy reporting devices only prov...
Younghun Kim, Thomas Schmid, Zainul Charbiwala, Ma...
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
15 years 3 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...