Sciweavers

160 search results - page 24 / 32
» Exploiting structural information for semi-structured docume...
Sort
View
CIDM
2009
IEEE
14 years 2 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
IADIS
2004
13 years 8 months ago
Electronic case studies: a problem-based learning approach
E-Cases is an innovative approach to management development. Traditional case studies typically describe a decision or a problem in a real-life setting. E-Cases encourage students...
Philip M. Drinkwater, Christopher P. Holland, K. N...
WWW
2010
ACM
14 years 2 months ago
The anatomy of an ad: structured indexing and retrieval for sponsored search
The core task of sponsored search is to retrieve relevant ads for the user’s query. Ads can be retrieved either by exact match, when their bid term is identical to the query, or...
Michael Bendersky, Evgeniy Gabrilovich, Vanja Josi...
IDEAS
2009
IEEE
192views Database» more  IDEAS 2009»
14 years 2 months ago
A cluster-based approach to XML similarity joins
A natural consequence of the widespread adoption of XML as standard for information representation and exchange is the redundant storage of large amounts of persistent XML documen...
Leonardo Ribeiro, Theo Härder, Fernanda S. Pi...
SIGMOD
2002
ACM
135views Database» more  SIGMOD 2002»
14 years 7 months ago
StatiX: making XML count
The availability of summary data for XML documents has many applications, from providing users with quick feedback about their queries, to cost-based storage design and query opti...
Juliana Freire, Jayant R. Haritsa, Maya Ramanath, ...