Sciweavers

64 search results - page 10 / 13
» A brief history of scanning
Sort
View
STACS
1992
Springer
13 years 12 months ago
Speeding Up Two String-Matching Algorithms
We show how to speed up two string-matching algorithms: the Boyer-Moore algorithm (BM algorithm), and its version called here the reverse factor algorithm (RF algorithm). The RF al...
Maxime Crochemore, Thierry Lecroq, Artur Czumaj, L...
JCDL
2009
ACM
121views Education» more  JCDL 2009»
14 years 2 months ago
Improving historical research by linking digital library information to a global genealogical database
Journals, letters, and other writings are of great value to historians and those who research their own family history; however, it can be difficult to find writings by specific...
Douglas J. Kennard, William B. Lund, Bryan S. Mors...
IPPS
2007
IEEE
14 years 2 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
CIKM
2004
Springer
14 years 1 months ago
Discovering frequently changing structures from historical structural deltas of unordered XML
Recently, a large amount of work has been done in XML data mining. However, we observed that most of the existing works focus on the snapshot XML data, while XML data is dynamic i...
Qiankun Zhao, Sourav S. Bhowmick, Mukesh K. Mohani...
LREC
2010
146views Education» more  LREC 2010»
13 years 9 months ago
From XML to XML: The Why and How of Making the Biodiversity Literature Accessible to Researchers
We present the ABLE document collection, which consists of a set of annotated volumes of the Bulletin of the British Museum (Natural History). These were developed during our ongo...
Alistair Willis, David King, David Morse, Anton Di...