Sciweavers

2067 search results - page 294 / 414
» Modeling and exploiting query interactions in database syste...
Sort
View
176
Voted
EDBT
2012
ACM
216views Database» more  EDBT 2012»
13 years 7 months ago
Effectively indexing the multi-dimensional uncertain objects for range searching
The range searching problem is fundamental in a wide spectrum of applications such as radio frequency identification (RFID) networks, location based services (LBS), and global po...
Ying Zhang, Wenjie Zhang, Qianlu Lin, Xuemin Lin
170
Voted
ICCS
2009
Springer
15 years 11 months ago
Distinguishing Answers in Conceptual Graph Knowledge Bases
Abstract. In knowledge bases, the open world assumption and the ability to express variables may lead to an answer redundancy problem. This problem occurs when the returned answers...
Nicolas Moreau, Michel Leclère, Madalina Cr...
AGENTS
2000
Springer
15 years 9 months ago
Scalability of a Transactional Infrastructure for Multi-Agent Systems
Abstract. One of the reasons for attending to agent technology is the evergrowing complexity of information systems and the increasing difficulty to foresee and plan for all potent...
Khaled Nagi
CHI
2009
ACM
16 years 5 months ago
An intuitive model of perceptual grouping for HCI design
Understanding and exploiting the abilities of the human visual system is an important part of the design of usable user interfaces and information visualizations. Good design enab...
Ruth Rosenholtz, Nathaniel R. Twarog, Nadja Schink...
POPL
2006
ACM
16 years 4 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann