Sciweavers

6300 search results - page 1192 / 1260
» We have it easy, but do we have it right
Sort
View
VLDB
2002
ACM
161views Database» more  VLDB 2002»
15 years 12 days ago
Distributed Search over the Hidden Web: Hierarchical Database Sampling and Selection
Many valuable text databases on the web have non-crawlable contents that are "hidden" behind search interfaces. Metasearchers are helpful tools for searching over many s...
Panagiotis G. Ipeirotis, Luis Gravano
89
Voted
SAC
2008
ACM
15 years 7 days ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
INFOCOM
2010
IEEE
14 years 11 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
125
Voted
ISSRE
2010
IEEE
14 years 11 months ago
The Impact of Coupling on the Fault-Proneness of Aspect-Oriented Programs: An Empirical Study
—Coupling in software applications is often used as an indicator of external quality attributes such as fault-proneness. In fact, the correlation of coupling metrics and faults i...
Rachel Burrows, Fabiano Cutigi Ferrari, Otá...
PVLDB
2010
120views more  PVLDB 2010»
14 years 11 months ago
EXTRUCT: Using Deep Structural Information in XML Keyword Search
Users who are unfamiliar with database query languages can search XML data sets using keyword queries. Previous work has shown that current XML keyword search methods, although in...
Arash Termehchy, Marianne Winslett
« Prev « First page 1192 / 1260 Last » Next »