Sciweavers

325 search results - page 57 / 65
» A Model of Methods Access Authorization in Object-oriented D...
Sort
View
EDBT
2009
ACM
302views Database» more  EDBT 2009»
15 years 9 months ago
RankClus: integrating clustering with ranking for heterogeneous information network analysis
As information networks become ubiquitous, extracting knowledge from information networks has become an important task. Both ranking and clustering can provide overall views on in...
Yizhou Sun, Jiawei Han, Peixiang Zhao, Zhijun Yin,...
117
Voted
CIKM
2004
Springer
15 years 7 months ago
Node ranking in labeled directed graphs
Our work is motivated by the problem of ranking hyperlinked documents for a given query. Given an arbitrary directed graph with edge and node labels, we present a new flow-based ...
Krishna Prasad Chitrapura, Srinivas R. Kashyap
ICASSP
2010
IEEE
15 years 2 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ER
2003
Springer
84views Database» more  ER 2003»
15 years 7 months ago
Resolving Structural Conflicts in the Integration of XML Schemas: A Semantic Approach
While the Internet has facilitated access to information sources, the task of scalable integration of these heterogeneous data sources remains a challenge. The adoption of the eXte...
Xia Yang, Mong-Li Lee, Tok Wang Ling
147
Voted
SIGUCCS
2003
ACM
15 years 7 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah