Sciweavers

2421 search results - page 202 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
131
Voted
ACL
2012
13 years 6 months ago
Lemmatisation as a Tagging Task
We present a novel approach to the task of word lemmatisation. We formalise lemmatisation as a category tagging task, by describing how a word-to-lemma transformation rule can be ...
Andrea Gesmundo, Tanja Samardzic
136
Voted
SIGMOD
2000
ACM
99views Database» more  SIGMOD 2000»
15 years 8 months ago
WSQ/DSQ: A Practical Approach for Combined Querying of Databases and the Web
We present WSQ/DSQ (pronounced “wisk-disk”), a new approach for combining the query facilities of traditional databases with existing search engines on the Web. WSQ, for Web-S...
Roy Goldman, Jennifer Widom
133
Voted
CIKM
2008
Springer
15 years 5 months ago
On effective presentation of graph patterns: a structural representative approach
In the past, quite a few fast algorithms have been developed to mine frequent patterns over graph data, with the large spectrum covering many variants of the problem. However, the...
Chen Chen, Cindy Xide Lin, Xifeng Yan, Jiawei Han
113
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
119
Voted
AAAI
2007
15 years 6 months ago
Parallel Structured Duplicate Detection
We describe a novel approach to parallelizing graph search using structured duplicate detection. Structured duplicate detection was originally developed as an approach to external...
Rong Zhou, Eric A. Hansen