Sciweavers

603 search results - page 105 / 121
» Monitoring XML Data on the Web
Sort
View
SASO
2008
IEEE
15 years 5 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
ICDE
2004
IEEE
115views Database» more  ICDE 2004»
16 years 10 days ago
Unordered Tree Mining with Applications to Phylogeny
Frequent structure mining (FSM) aims to discover and extract patterns frequently occurring in structural data, such as trees and graphs. FSM finds many applications in bioinformat...
Dennis Shasha, Jason Tsong-Li Wang, Sen Zhang
AUSDM
2007
Springer
113views Data Mining» more  AUSDM 2007»
15 years 5 months ago
PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Sangeetha Kutty, Richi Nayak, Yuefeng Li
ER
2001
Springer
130views Database» more  ER 2001»
15 years 3 months ago
NF-SS: A Normal Form for Semistructured Schema
Semistructured data is becoming increasingly important for web applications with the development of XML and related technologies. Designing a “good” semistructured database is ...
Xiaoying Wu, Tok Wang Ling, Sin Yeung Lee, Mong-Li...
102
Voted
SEMWEB
2001
Springer
15 years 3 months ago
Utilizing Host-Formalisms to Extend RDF-Semantics
Abstract. RDF may be considered as an application of XML intended to interoperably exchange semantics between Web applications. In its current form, this objective may be hard to r...
Wolfram Conen, Reinhold Klapsing