Sciweavers

5970 search results - page 1048 / 1194
» Management Information Model Engineering
Sort
View
JAPLL
2010
179views more  JAPLL 2010»
15 years 2 months ago
Tractable query answering and rewriting under description logic constraints
Answering queries over an incomplete database w.r.t. a set of constraints is an important computational task with applications in fields as diverse as information integration and ...
Héctor Pérez-Urbina, Boris Motik, Ia...
GIS
2009
ACM
15 years 1 months ago
Distortion-based anonymity for continuous queries in location-based mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
Xiao Pan, Xiaofeng Meng, Jianliang Xu
ICC
2009
IEEE
125views Communications» more  ICC 2009»
15 years 1 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
165
Voted
KDD
2012
ACM
244views Data Mining» more  KDD 2012»
13 years 6 months ago
Open domain event extraction from twitter
Tweets are the most up-to-date and inclusive stream of information and commentary on current events, but they are also fragmented and noisy, motivating the need for systems that c...
Alan Ritter, Mausam, Oren Etzioni, Sam Clark
WWW
2009
ACM
16 years 4 months ago
Search shortcuts: driving users towards their goals
Giving suggestions to users of Web-based services is a common practice aimed at enhancing their navigation experience. Major Web Search Engines usually provide Suggestions under t...
Ranieri Baraglia, Fidel Cacheda, Victor Carneiro, ...
« Prev « First page 1048 / 1194 Last » Next »