Sciweavers

5344 search results - page 949 / 1069
» Privacy-Preserving Set Operations
Sort
View
240
Voted
ICDT
2009
ACM
248views Database» more  ICDT 2009»
16 years 4 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
134
Voted
WWW
2008
ACM
16 years 4 months ago
Anycast CDNS revisited
Because it is an integral part of the Internet routing apparatus, and because it allows multiple instances of the same service to be "naturally" discovered, IP Anycast h...
Hussein A. Alzoubi, Seungjoon Lee, Michael Rabinov...
WWW
2007
ACM
16 years 4 months ago
Visibly pushdown automata for streaming XML
We propose the study of visibly pushdown automata (Vpa) for processing XML documents. Vpas are pushdown automata where the input determines the stack operation, and XML documents ...
Viraj Kumar, P. Madhusudan, Mahesh Viswanathan
WWW
2007
ACM
16 years 4 months ago
A high-performance interpretive approach to schema-directed parsing
XML delivers key advantages in interoperability due to its flexibility, expressiveness, and platform-neutrality. As XML has become a performance-critical aspect of the next genera...
Morris Matsa, Eric Perkins, Abraham Heifets, Marga...
WWW
2003
ACM
16 years 4 months ago
Mining the peanut gallery: opinion extraction and semantic classification of product reviews
The web contains a wealth of product reviews, but sifting through them is a daunting task. Ideally, an opinion mining tool would process a set of search results for a given item, ...
Kushal Dave, Steve Lawrence, David M. Pennock