Sciweavers

3305 search results - page 80 / 661
» Can we Rely on SQL
Sort
View
HT
2000
ACM
14 years 2 days ago
Hypertext interaction revisited
Much of hypertext narrative relies on links to shape a reader’s interaction with the text. But links may be too limited to express ambiguity, imprecision, and entropy, or to adm...
Gene Golovchinsky, Catherine C. Marshall
COLING
2000
13 years 9 months ago
Exogeneous and Endogeneous Approaches to Semantic Categorization of Unknown Technical Terms
Acquiring and updating terminological resources are di cult and tedious tasks, especially when semantic information should be provided. This paper deals with Term Semantic Categor...
Farid Cerbah
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 1 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
POPL
2011
ACM
12 years 10 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen
ICDE
2010
IEEE
177views Database» more  ICDE 2010»
14 years 2 months ago
Optimal load shedding with aggregates and mining queries
— To cope with bursty arrivals of high-volume data, a DSMS has to shed load while minimizing the degradation of Quality of Service (QoS). In this paper, we show that this problem...
Barzan Mozafari, Carlo Zaniolo