Sciweavers

1575 search results - page 196 / 315
» The provenance of electronic data
Sort
View
SIGMOD
2008
ACM
109views Database» more  SIGMOD 2008»
15 years 12 months ago
Extreme visualization: squeezing a billion records into a million pixels
Database searches are usually performed with query languages and form fill in templates, with results displayed in tabular lists. However, excitement is building around dynamic qu...
Ben Shneiderman
SIGMOD
2005
ACM
161views Database» more  SIGMOD 2005»
15 years 12 months ago
Efficient Keyword Search for Smallest LCAs in XML Databases
Keyword search is a proven, user-friendly way to query HTML documents in the World Wide Web. We propose keyword search in XML documents, modeled as labeled trees, and describe cor...
Yu Xu, Yannis Papakonstantinou
ICFP
2005
ACM
15 years 11 months ago
Associated type synonyms
ML modules and Haskell type classes have proven to be highly effective tools for program structuring. Modules emphasize explicit configuration of program components and the use of...
Manuel M. T. Chakravarty, Gabriele Keller, Simon L...
EUROSEC
2009
ACM
15 years 6 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
ICASSP
2009
IEEE
15 years 6 months ago
A flat direct model for speech recognition
We introduce a direct model for speech recognition that assumes an unstructured, i.e., flat text output. The flat model allows us to model arbitrary attributes and dependences o...
Georg Heigold, Geoffrey Zweig, Xiao Li, Patrick Ng...