Sciweavers

777 search results - page 149 / 156
» Declarative Data Cleaning: Language, Model, and Algorithms
Sort
View
ISCI
2008
93views more  ISCI 2008»
13 years 7 months ago
Safety, domain independence and translation of complex value database queries
This paper considers the theory of database queries on the complex value data model with external functions. Motivated by concerns regarding query evaluation, we first identify re...
Hong-Cheu Liu, Jeffrey Xu Yu, Weifa Liang
TCS
2008
13 years 7 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
CORR
2011
Springer
160views Education» more  CORR 2011»
13 years 2 months ago
Provenance for Aggregate Queries
We study in this paper provenance information for queries with aggregation. Provenance information was studied in the context of various query languages that do not allow for aggr...
Yael Amsterdamer, Daniel Deutch, Val Tannen
ACL
2012
11 years 10 months ago
Computational Approaches to Sentence Completion
This paper studies the problem of sentencelevel semantic coherence by answering SATstyle sentence completion questions. These questions test the ability of algorithms to distingui...
Geoffrey Zweig, John C. Platt, Christopher Meek, C...
WWW
2010
ACM
14 years 2 months ago
A scalable machine-learning approach for semi-structured named entity recognition
Named entity recognition studies the problem of locating and classifying parts of free text into a set of predefined categories. Although extensive research has focused on the de...
Utku Irmak, Reiner Kraft