Sciweavers

1629 search results - page 285 / 326
» A Study of Malcode-Bearing Documents
Sort
View
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
14 years 15 days ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
HOTSWUP
2009
ACM
14 years 11 days ago
Automating Database Schema Evolution in Information System Upgrades
The complexity, cost, and down-time currently created by the database schema evolution process is the source of incessant problems in the life of information systems and a major s...
Carlo Curino, Hyun Jin Moon, Carlo Zaniolo
WWW
2009
ACM
14 years 11 days ago
Extracting data records from the web using tag path clustering
Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies...
Gengxin Miao, Jun'ichi Tatemura, Wang-Pin Hsiung, ...
INEX
2009
Springer
14 years 9 days ago
Overview of the INEX 2009 Ad Hoc Track
This paper gives an overview of the INEX 2009 Ad Hoc Track. The main goals of the Ad Hoc Track were three-fold. The first goal was to investigate the impact of the collection scal...
Shlomo Geva, Jaap Kamps, Miro Lehtonen, Ralf Schen...
CIKM
2001
Springer
14 years 6 days ago
X007: Applying 007 Benchmark to XML Query Processing Tool
If XML is to play the critical role of the lingua franca for Internet data interchange that many predict, it is necessary to start designing and adopting benchmarks allowing the c...
Stéphane Bressan, Gillian Dobbie, Zoé...