Sciweavers

2036 search results - page 356 / 408
» Using and Abusing XML
Sort
View
113
Voted
PERCOM
2009
ACM
16 years 2 months ago
Programmable Presence Virtualization for Next-Generation Context-Based Applications
Abstract--Presence, broadly defined as an event publishnotification infrastructure for converged applications, has emerged as a key mechanism for collecting and disseminating conte...
Arup Acharya, Nilanjan Banerjee, Dipanjan Chakrabo...
KDD
2005
ACM
162views Data Mining» more  KDD 2005»
16 years 2 months ago
Discovering frequent topological structures from graph datasets
The problem of finding frequent patterns from graph-based datasets is an important one that finds applications in drug discovery, protein structure analysis, XML querying, and soc...
Ruoming Jin, Chao Wang, Dmitrii Polshakov, Sriniva...
SIGMOD
2008
ACM
193views Database» more  SIGMOD 2008»
16 years 1 months ago
Efficient provenance storage
Scientific workflow systems are increasingly used to automate complex data analyses, largely due to their benefits over traditional approaches for workflow design, optimization, a...
Adriane Chapman, H. V. Jagadish, Prakash Ramanan
SIGMOD
2003
ACM
162views Database» more  SIGMOD 2003»
16 years 1 months ago
DBGlobe: a service-oriented P2P system for global computing
The challenge of peer-to-peer computing goes beyond simple file sharing. In the DBGlobe project, we view the multitude of peers carrying data and services as a superdatabase. Our ...
Evaggelia Pitoura, Serge Abiteboul, Dieter Pfoser,...
PODS
2005
ACM
109views Database» more  PODS 2005»
16 years 1 months ago
XPath satisfiability in the presence of DTDs
We study the satisfiability problem associated with XPath in the presence of DTDs. This is the problem of determining, given a query p in an XPath fragment and a DTD D, whether or...
Michael Benedikt, Wenfei Fan, Floris Geerts