Sciweavers

9162 search results - page 112 / 1833
» System and User Data Complexity
Sort
View
WWW
2006
ACM
15 years 10 months ago
Interactive wrapper generation with minimal user effort
While much of the data on the web is unstructured in nature, there is also a significant amount of embedded structured data, such as product information on e-commerce sites or sto...
Utku Irmak, Torsten Suel
SAC
2000
ACM
15 years 2 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
VLDB
2007
ACM
126views Database» more  VLDB 2007»
15 years 10 months ago
Querying Complex Structured Databases
Correctly generating a structured query (e.g., an XQuery or a SQL query) requires the user to have a full understanding of the database schema, which can be a daunting task. Alter...
Cong Yu, H. V. Jagadish
CORR
2008
Springer
127views Education» more  CORR 2008»
14 years 10 months ago
Achieving Near-Capacity at Low SNR on a Multiple-Antenna Multiple-User Channel
We analyze the sensitivity of the capacity of a multi-antenna multi-user system to the number of users being served. We show analytically that, for a given desired sum-rate, the e...
Chau Yuen, Bertrand M. Hochwald
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 2 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley