Sciweavers

156 search results - page 29 / 32
» Co-evolution Model for Data Sources and Views
Sort
View
DGO
2003
111views Education» more  DGO 2003»
13 years 9 months ago
Digital Citizenship: Parameters of the Digital Divide
As part of a National Science Foundation-funded study, we analyze data from a 2002 Midwest urban random sample survey (n = 167 adults) of differential access to and uses of comput...
Stuart W. Shulman, Mack C. Shelley, Lisa Thrane
SIGIR
2009
ACM
14 years 2 months ago
Extracting structured information from user queries with semi-supervised conditional random fields
When search is against structured documents, it is beneficial to extract information from user queries in a format that is consistent with the backend data structure. As one step...
Xiao Li, Ye-Yi Wang, Alex Acero
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
COMCOM
2004
138views more  COMCOM 2004»
13 years 7 months ago
Issues with inferring Internet topological attributes
A number of recent studies of Internet network structure are based on data collected from inter-domain BGP routing tables and tools, such as traceroute, to probe end-to-end paths....
Lisa Amini, Anees Shaikh, Henning Schulzrinne
ICDE
2007
IEEE
193views Database» more  ICDE 2007»
14 years 9 months ago
Categorization and Optimization of Synchronization Dependencies in Business Processes
requirement. Furthermore, programming using sequence constructs normally produce nested structures and The current approachfor modeling synchronization in scattered code, especiall...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga