Sciweavers

640 search results - page 33 / 128
» Wrapper Generation for Web Accessible Data Sources
Sort
View
USS
2004
14 years 11 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
74
Voted
BMCBI
2006
126views more  BMCBI 2006»
14 years 9 months ago
JUICE: a data management system that facilitates the analysis of large volumes of information in an EST project workflow
Background: Expressed sequence tag (EST) analyses provide a rapid and economical means to identify candidate genes that may be involved in a particular biological process. These E...
Mariano Latorre, Herman Silva, Juan Saba, Carito G...
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 3 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
SEMWEB
2010
Springer
14 years 7 months ago
Linking and Building Ontologies of Linked Data
The Web of Linked Data is characterized by linking structured data from different sources using equivalence statements, such as owl:sameAs, as well as other types of linked propert...
Rahul Parundekar, Craig A. Knoblock, José L...
WEBDB
2009
Springer
131views Database» more  WEBDB 2009»
15 years 4 months ago
Functional Dependency Generation and Applications in Pay-As-You-Go Data Integration Systems
Recently, the opportunity of extracting structured data from the Web has been identified by a number of research projects. One such example is that millions of relational-style H...
Daisy Zhe Wang, Xin Luna Dong, Anish Das Sarma, Mi...