Sciweavers

554 search results - page 17 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
VLDB
1997
ACM
117views Database» more  VLDB 1997»
13 years 11 months ago
Optimizing Queries Across Diverse Data Sources
Businesses today need to interrelate data stored in diverse systems with differing capabilities, ideally via a single high-level query interface. We present the design of a query ...
Laura M. Haas, Donald Kossmann, Edward L. Wimmers,...
ICDM
2008
IEEE
143views Data Mining» more  ICDM 2008»
14 years 2 months ago
Exploiting Data Semantics to Discover, Extract, and Model Web Sources
We describe DEIMOS, a system that automatically discovers and models new sources of information. The system exploits four core technologies developed by our group that makes an en...
José Luis Ambite, Craig A. Knoblock, Kristi...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 1 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
WWW
2005
ACM
14 years 8 months ago
Delivering new web content reusing remote and heterogeneous sites. A DOM-based approach
This contribution addresses the development of new web sites reusing already existing contents from external sources. Unlike common links to other resources, which retrieves the w...
Luis Álvarez Sabucedo, Luis E. Anido-Rif&oa...
BMCBI
2006
203views more  BMCBI 2006»
13 years 7 months ago
Independent component analysis reveals new and biologically significant structures in micro array data
Background: An alternative to standard approaches to uncover biologically meaningful structures in micro array data is to treat the data as a blind source separation (BSS) problem...
Attila Frigyesi, Srinivas Veerla, David Lindgren, ...