Sciweavers

2677 search results - page 410 / 536
» Extracting Structured Data from Web Pages
Sort
View
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 8 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
ICDE
1995
IEEE
101views Database» more  ICDE 1995»
16 years 2 months ago
Two-Level Caching of Composite Object Views of Relational Databases
We describe a two-level client-side cache for composite objects mapped as views of a relational database. A semantic model, the Structural Model, is used to specify joins on the r...
Catherine Hamon, Arthur M. Keller
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 2 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
NAR
2011
208views Computer Vision» more  NAR 2011»
14 years 4 months ago
MIPS: curated databases and comprehensive secondary data resources in 2010
The Munich Information Center for Protein Sequences (MIPS at the Helmholtz Center for Environmental Health, Neuherberg, Germany) has many years of experience in providing annotate...
Hans-Werner Mewes, Andreas Ruepp, Fabian J. Theis,...
SIGMOD
2008
ACM
142views Database» more  SIGMOD 2008»
16 years 1 months ago
Cost-based variable-length-gram selection for string collections to support approximate queries efficiently
Approximate queries on a collection of strings are important in many applications such as record linkage, spell checking, and Web search, where inconsistencies and errors exist in...
Xiaochun Yang, Bin Wang, Chen Li