Sciweavers

771 search results - page 118 / 155
» Access Methods and Query Processing Techniques
Sort
View
ICSE
2005
IEEE-ACM
14 years 10 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
JCDL
2004
ACM
112views Education» more  JCDL 2004»
14 years 3 months ago
Metaextract: an NLP system to automatically assign metadata
We have developed MetaExtract, a system to automatically assign Dublin Core + GEM metadata using extraction techniques from our natural language processing research. MetaExtract i...
Ozgur Yilmazel, Christina M. Finneran, Elizabeth D...
SAC
2010
ACM
14 years 4 months ago
Enhancing document structure analysis using visual analytics
During the last decade national archives, libraries, museums and companies started to make their records, books and files electronically available. In order to allow efficient ac...
Andreas Stoffel, David Spretke, Henrik Kinnemann, ...
WWW
2008
ACM
14 years 10 months ago
Performance of compressed inverted list caching in search engines
Due to the rapid growth in the size of the web, web search engines are facing enormous performance challenges. The larger engines in particular have to be able to process tens of ...
Jiangong Zhang, Xiaohui Long, Torsten Suel
WWW
2002
ACM
14 years 10 months ago
Probabilistic question answering on the web
Web-based search engines such as Google and NorthernLight return documents that are relevant to a user query, not answers to user questions. We have developed an architecture that...
Dragomir R. Radev, Weiguo Fan, Hong Qi, Harris Wu,...