Sciweavers

325 search results - page 57 / 65
» A Model of Methods Access Authorization in Object-oriented D...
Sort
View
EDBT
2009
ACM
302views Database» more  EDBT 2009»
14 years 2 months ago
RankClus: integrating clustering with ranking for heterogeneous information network analysis
As information networks become ubiquitous, extracting knowledge from information networks has become an important task. Both ranking and clustering can provide overall views on in...
Yizhou Sun, Jiawei Han, Peixiang Zhao, Zhijun Yin,...
CIKM
2004
Springer
14 years 1 months ago
Node ranking in labeled directed graphs
Our work is motivated by the problem of ranking hyperlinked documents for a given query. Given an arbitrary directed graph with edge and node labels, we present a new flow-based ...
Krishna Prasad Chitrapura, Srinivas R. Kashyap
ICASSP
2010
IEEE
13 years 7 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ER
2003
Springer
84views Database» more  ER 2003»
14 years 25 days ago
Resolving Structural Conflicts in the Integration of XML Schemas: A Semantic Approach
While the Internet has facilitated access to information sources, the task of scalable integration of these heterogeneous data sources remains a challenge. The adoption of the eXte...
Xia Yang, Mong-Li Lee, Tok Wang Ling
SIGUCCS
2003
ACM
14 years 26 days ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah