Sciweavers

526 search results - page 101 / 106
» date 2008
Sort
View
176
Voted
BSL
2011
14 years 7 months ago
Combinatorial dichotomies in set theory
show that an abstract analysis of one of these three set theoretic principles can sometimes lead us to results that do not require additional axioms at all but which could have bee...
Stevo Todorcevic
96
Voted
USENIX
2008
15 years 2 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
ICDE
2008
IEEE
103views Database» more  ICDE 2008»
16 years 1 months ago
Efficient Information Extraction over Evolving Text Data
Abstract-- Most current information extraction (IE) approaches have considered only static text corpora, over which we typically have to apply IE only once. Many real-world text co...
Fei Chen 0002, AnHai Doan, Jun Yang 0001, Raghu Ra...
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
16 years 1 months ago
RAD: A Scalable Framework for Annotator Development
Developments in semantic search technology have motivated the need for efficient and scalable entity annotation techniques. We demonstrate RAD: a tool for Rapid Annotator Developme...
Sanjeet Khaitan, Ganesh Ramakrishnan, Sachindra Jo...
220
Voted
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
16 years 1 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...