Sciweavers

2067 search results - page 159 / 414
» Modeling and exploiting query interactions in database syste...
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 7 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
DASFAA
2007
IEEE
135views Database» more  DASFAA 2007»
15 years 11 months ago
A Development of Hash-Lookup Trees to Support Querying Streaming XML
Abstract. The rapid growth in the amount of XML data and the development of publish-subscribe systems have led to great interest in processing streaming XML data. We propose the Qs...
James Cheng, Wilfred Ng
145
Voted
ACL
2003
15 years 6 months ago
A Noisy-Channel Approach to Question Answering
We introduce a probabilistic noisychannel model for question answering and we show how it can be exploited in the context of an end-to-end QA system. Our noisy-channel system outp...
Abdessamad Echihabi, Daniel Marcu
135
Voted
SIGMOD
2003
ACM
126views Database» more  SIGMOD 2003»
16 years 5 months ago
Issues in data stream management
Traditional databases store sets of relatively static records with no pre-defined notion of time, unless timestamp attributes are explicitly added. While this model adequately rep...
Lukasz Golab, M. Tamer Özsu
145
Voted
DAGSTUHL
2007
15 years 6 months ago
An analytic solution to the alibi query in the bead model for moving object data
Abstract. Moving objects produce trajectories, which are stored in databases by means of finite samples of time-stamped locations. When also speed limitations in these sample poin...
Bart Kuijpers, Walied Othman