Sciweavers

2995 search results - page 225 / 599
» On multi-avoidance of generalized patterns
Sort
View
VLDB
2007
ACM
113views Database» more  VLDB 2007»
14 years 11 months ago
Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures
We propose a novel string search algorithm for data stored once and read many times. Our search method combines the sublinear traversal of the record (as in Boyer Moore or Knuth-M...
Witold Litwin, Riad Mokadem, Philippe Rigaux, Thom...
SIGMOD
2007
ACM
125views Database» more  SIGMOD 2007»
14 years 10 months ago
Identifying meaningful return information for XML keyword search
Keyword search enables web users to easily access XML data without the need to learn a structured query language and to study possibly complex data schemas. Existing work has addr...
Ziyang Liu, Yi Chen
ICSE
2005
IEEE-ACM
14 years 10 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 7 months ago
Measuring Discrimination in Socially-Sensitive Decision Records.
Discrimination in social sense (e.g., against minorities and disadvantaged groups) is the subject of many laws worldwide, and it has been extensively studied in the social and eco...
Dino Pedreschi, Franco Turini, Salvatore Ruggieri
SAC
2010
ACM
14 years 5 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...