Sciweavers

141 search results - page 22 / 29
» Destruction of Very Simple Trees
Sort
View
SAC
2006
ACM
14 years 1 months ago
Approaches to text mining for clinical medical records
Clinical medical records contain a wealth of information, largely in free-text form. Means to extract structured information from free-text records is an important research endeav...
Xiaohua Zhou, Hyoil Han, Isaac Chankai, Ann Prestr...
ADC
2003
Springer
139views Database» more  ADC 2003»
14 years 19 days ago
Deriving Relation Keys from XML Keys
Much work on XML data was around storage and querying and did not consider constraints of XML, especially keys. Since constraints have been proposed in many papers for XML, much r...
Qing Wang, Hongwei Wu, Jianchang Xiao, Aoying Zhou...
CCS
2003
ACM
14 years 19 days ago
The blocker tag: selective blocking of RFID tags for consumer privacy
We propose the use of “selective blocking” by “blocker tags” as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or...
Ari Juels, Ronald L. Rivest, Michael Szydlo
ESA
2006
Springer
111views Algorithms» more  ESA 2006»
13 years 11 months ago
Path Hitting in Acyclic Graphs
An instance of the path hitting problem consists of two families of paths, D and H, in a common undirected graph, where each path in H is associated with a non-negative cost. We r...
Ojas Parekh, Danny Segev
DAGSTUHL
2006
13 years 8 months ago
Program Compression
Abstract. The talk focused on a grammar-based technique for identifying redundancy in program code and taking advantage of that redundancy to reduce the memory required to store an...
William S. Evans