Sciweavers

1575 search results - page 148 / 315
» The provenance of electronic data
Sort
View
ERCIMDL
2009
Springer
177views Education» more  ERCIMDL 2009»
15 years 4 months ago
Curated Databases
Curated databases are databases that are populated and updated with a great deal of human effort. Most reference works that one traditionally found on the reference shelves of li...
Peter Buneman
ESWS
2009
Springer
15 years 6 months ago
Relational Databases as Semantic Web Endpoints
This proposal explores the promotion of existing relational databases to Semantic Web Endpoints. It presents the benefits of ontologybased read and write access to existing relati...
Matthias Hert
CVPR
2007
IEEE
16 years 1 months ago
Element Rearrangement for Tensor-Based Subspace Learning
The success of tensor-based subspace learning depends heavily on reducing correlations along the column vectors of the mode-k flattened matrix. In this work, we study the problem ...
Shuicheng Yan, Dong Xu, Stephen Lin, Thomas S. Hua...
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 5 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
PLDI
2006
ACM
15 years 5 months ago
LOCKSMITH: context-sensitive correlation analysis for race detection
One common technique for preventing data races in multi-threaded programs is to ensure that all accesses to shared locations are consistently protected by a lock. We present a too...
Polyvios Pratikakis, Jeffrey S. Foster, Michael W....