Sciweavers

4397 search results - page 535 / 880
» Relational Algebra Operations
Sort
View
ICFP
2008
ACM
16 years 4 months ago
Typed closure conversion preserves observational equivalence
Language-based security relies on the assumption that all potential attacks are bound by the rules of the language in question. When programs are compiled into a different languag...
Amal Ahmed, Matthias Blume
ICDE
2010
IEEE
224views Database» more  ICDE 2010»
16 years 4 months ago
Probabilistic Declarative Information Extraction
Abstract-Unstructured text represents a large fraction of the world's data. It often contain snippets of structured information within them (e.g., people's names and zip ...
Daisy Zhe Wang, Eirinaios Michelakis, Joseph M. He...
121
Voted
EDBT
2010
ACM
127views Database» more  EDBT 2010»
15 years 11 months ago
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Relational databases are periodically vacuumed to remove tuples that have expired. During the discovery phase of litigation, plaintiffs ask defendants for access to information re...
Ragib Hasan, Marianne Winslett
ICDAR
2009
IEEE
15 years 11 months ago
ICDAR 2009 Handwritten Farsi/Arabic Character Recognition Competition
In recent years, the recognition of Farsi and Arabic handwriting is drawing increasing attention. This paper describes the result of the ICDAR 2009 competition for handwritten Far...
Saeed Mozaffari, Hadi Soltanizadeh
KSEM
2009
Springer
15 years 11 months ago
On Optimization of Predictions in Ontology-Driven Situation Awareness
Systems supporting situation awareness in large-scale control systems, such as, e. g., encountered in the domain of road traffic management, pursue the vision of allowing human ope...
Norbert Baumgartner, Wolfgang Gottesheim, Stefan M...