Sciweavers

763 search results - page 61 / 153
» Effective query formulation with multiple information source...
Sort
View
SACMAT
2004
ACM
15 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
ER
1998
Springer
147views Database» more  ER 1998»
15 years 2 months ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...
SIGMOD
1998
ACM
97views Database» more  SIGMOD 1998»
15 years 2 months ago
Cost Based Query Scrambling for Initial Delays
Remote data access from disparate sources across a widearea network such as the Internet is problematic due to the unpredictable nature of the communications medium and the lack o...
Tolga Urhan, Michael J. Franklin, Laurent Amsaleg
SIGIR
2009
ACM
15 years 4 months ago
Learning to rank for quantity consensus queries
Web search is increasingly exploiting named entities like persons, places, businesses, addresses and dates. Entity ranking is also of current interest at INEX and TREC. Numerical ...
Somnath Banerjee, Soumen Chakrabarti, Ganesh Ramak...
IJCMAM
2010
133views more  IJCMAM 2010»
14 years 7 months ago
Privacy Preserving Integration of Health Care Data
For health care related research studies the medical records of patients may need to be retrieved from multiple sites with different regulations on the disclosure of health inform...
Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R....