Sciweavers

1959 search results - page 299 / 392
» Document Management as a Database Problem
Sort
View
DKE
2007
119views more  DKE 2007»
14 years 9 months ago
Error minimization in approximate range aggregates
Histogram techniques have been used in many commercial database management systems to estimate a query result size. Recently, it has been shown that they are very effective to su...
Xuemin Lin, Qing Zhang, Yidong Yuan, Qing Liu
IJNSEC
2010
143views more  IJNSEC 2010»
14 years 4 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
CIKM
2006
Springer
14 years 11 months ago
Voting for candidates: adapting data fusion techniques for an expert search task
In an expert search task, the users' need is to identify people who have relevant expertise to a topic of interest. An expert search system predicts and ranks the expertise o...
Craig Macdonald, Iadh Ounis
IEEEVAST
2010
14 years 4 months ago
Geo-historical context support for information foraging and sensemaking: Conceptual model, implementation, and assessment
Information foraging and sensemaking with heterogeneous information are context-dependent activities. Thus visual analytics tools to support these activities must incorporate cont...
Brian M. Tomaszewski, Alan M. MacEachren
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
15 years 11 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...