Sciweavers

1846 search results - page 194 / 370
» Generating query substitutions
Sort
View
SIGMOD
2012
ACM
212views Database» more  SIGMOD 2012»
11 years 10 months ago
Local structure and determinism in probabilistic databases
While extensive work has been done on evaluating queries over tuple-independent probabilistic databases, query evaluation over correlated data has received much less attention eve...
Theodoros Rekatsinas, Amol Deshpande, Lise Getoor
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 2 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
DMKD
2000
ACM
110views Data Mining» more  DMKD 2000»
14 years 12 days ago
Combining Strategies for Extracting Relations from Text Collections
Text documents often contain valuable structured data that is hidden in regular English sentences. This data is best exploited if available as a relational table that we could use...
Eugene Agichtein, Eleazar Eskin, Luis Gravano
ICCV
2007
IEEE
14 years 10 months ago
Webcam Synopsis: Peeking Around the World
The world is covered with millions of webcams. Some are private, but many transmit everything in their field of view over the internet 24 hours a day. A web search finds public we...
Yael Pritch, Alex Rav-Acha, Avital Gutman, Shmuel ...
HICSS
2005
IEEE
158views Biometrics» more  HICSS 2005»
14 years 1 months ago
Social Networks in Peer-to-Peer Systems
The Gnutella protocol requires peers to broadcast messages to their neighbours when they search files. The message passing generates a lot of traffic in the network, which degrade...
Yamini Upadrashta, Julita Vassileva, Winfried K. G...