Sciweavers

4199 search results - page 704 / 840
» Generalizing Data in Natural Language
Sort
View
CHI
2005
ACM
14 years 10 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
SIGMOD
2003
ACM
240views Database» more  SIGMOD 2003»
14 years 10 months ago
XRANK: Ranked Keyword Search over XML Documents
We consider the problem of efficiently producing ranked results for keyword search queries over hyperlinked XML documents. Evaluating keyword search queries over hierarchical XML ...
Lin Guo, Feng Shao, Chavdar Botev, Jayavel Shanmug...
CHI
2010
ACM
14 years 4 months ago
UpStream: motivating water conservation with low-cost water flow sensing and persuasive displays
Water is our most precious and most rapidly declining natural resource. We explore pervasive technology as an approach for promoting water conservation in public and private space...
Stacey Kuznetsov, Eric Paulos
ICDE
2009
IEEE
155views Database» more  ICDE 2009»
14 years 4 months ago
SPROUT: Lazy vs. Eager Query Plans for Tuple-Independent Probabilistic Databases
— A paramount challenge in probabilistic databases is the scalable computation of confidences of tuples in query results. This paper introduces an efficient secondary-storage o...
Dan Olteanu, Jiewen Huang, Christoph Koch
EUROSEC
2009
ACM
14 years 4 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov