Sciweavers

1629 search results - page 134 / 326
» A Study of Malcode-Bearing Documents
Sort
View
ICDT
2010
ACM
133views Database» more  ICDT 2010»
14 years 2 months ago
On the Tradeoff between Mapping and Querying Power in XML Data Exchange
In XML data exchange, a schema mapping specifies rules for restructuring a source document under the target schema, and queries over the target document must be answered in a way...
Shunichi Amano, Claire David, Leonid Libkin, Filip...
TVCG
2010
168views more  TVCG 2010»
13 years 7 months ago
Principles and Tools for Collaborative Entity-Based Intelligence Analysis
—Software tools that make it easier for analysts to collaborate as a natural part of their work will lead to better analysis that is informed by more perspectives. We are interes...
Eric A. Bier, Stuart K. Card, John W. Bodnar
EENERGY
2010
13 years 7 months ago
Accounting for the energy consumption of personal computing including portable devices
In light of the increased awareness of global energy consumption, questions are also being asked about the contribution of computing equipment. Though studies have documented the ...
Pavel Somavat, Shraddha Jadhav, Vinod Namboodiri
BMCBI
2010
98views more  BMCBI 2010»
13 years 9 months ago
Resolving anaphoras for the extraction of drug-drug interactions in pharmacological documents
Background: Drug-drug interactions are frequently reported in the increasing amount of biomedical literature. Information Extraction (IE) techniques have been devised as a useful ...
Isabel Segura-Bedmar, Mario Crespo, César d...
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
14 years 26 days ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser