Sciweavers

8294 search results - page 1529 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
KDD
2007
ACM
167views Data Mining» more  KDD 2007»
16 years 3 months ago
Generalized component analysis for text with heterogeneous attributes
We present a class of richly structured, undirected hidden variable models suitable for simultaneously modeling text along with other attributes encoded in different modalities. O...
Xuerui Wang, Chris Pal, Andrew McCallum
KDD
2006
ACM
159views Data Mining» more  KDD 2006»
16 years 3 months ago
Global distance-based segmentation of trajectories
This work introduces distance-based criteria for segmentation of object trajectories. Segmentation leads to simplification of the original objects into smaller, less complex primi...
Aris Anagnostopoulos, Michail Vlachos, Marios Hadj...
152
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ISAAC
2004
Springer
112views Algorithms» more  ISAAC 2004»
15 years 8 months ago
Dynamic Tree Cross Products
Abstract. Range searching over tree cross products – a variant of classic range searching – recently has been introduced by Buchsbaum et al. (Proc. 8th ESA, vol. 1879 of LNCS, ...
Marcus Raitner
SIGMOD
2009
ACM
165views Database» more  SIGMOD 2009»
15 years 8 months ago
Query by output
It has recently been asserted that the usability of a database is as important as its capability. Understanding the database schema, the hidden relationships among attributes in t...
Quoc Trung Tran, Chee-Yong Chan, Srinivasan Partha...
« Prev « First page 1529 / 1659 Last » Next »