Sciweavers

991 search results - page 114 / 199
» Analyzing URL queries
Sort
View
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
14 years 10 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
CHI
2006
ACM
14 years 9 months ago
A large scale study of wireless search behavior: Google mobile search
We present a large scale study of search patterns on Google's mobile search interface. Our goal is to understand the current state of wireless search by analyzing over 1 Mill...
Maryam Kamvar, Shumeet Baluja
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
14 years 9 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
SIGMOD
2004
ACM
174views Database» more  SIGMOD 2004»
14 years 9 months ago
PIPES - A Public Infrastructure for Processing and Exploring Streams
PIPES is a flexible and extensible infrastructure providing fundamental building blocks to implement a data stream management system (DSMS). It is seamlessly integrated into the J...
Bernhard Seeger, Jürgen Krämer
CCS
2010
ACM
14 years 3 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu