Sciweavers

167 search results - page 6 / 34
» On the provenance of non-answers to queries over extracted d...
Sort
View
PVLDB
2010
147views more  PVLDB 2010»
13 years 2 months ago
Automatic Rule Refinement for Information Extraction
Rule-based information extraction from text is increasingly being used to populate databases and to support structured queries on unstructured text. Specification of suitable info...
Bin Liu 0002, Laura Chiticariu, Vivian Chu, H. V. ...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 2 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
CONCURRENCY
2008
142views more  CONCURRENCY 2008»
13 years 8 months ago
Provenance trails in the Wings/Pegasus system
Our research focuses on creating and executing large-scale scientific workflows that often involve thousands of computations over distributed, shared resources. We describe an app...
Jihie Kim, Ewa Deelman, Yolanda Gil, Gaurang Mehta...
VLDB
2002
ACM
101views Database» more  VLDB 2002»
14 years 8 months ago
Efficient similarity search for market basket data
Several organizations have developed very large market basket databases for the maintenance of customer transactions. New applications, e.g., Web recommendation systems, present th...
Alexandros Nanopoulos, Yannis Manolopoulos
USENIX
2007
13 years 10 months ago
Using Provenance to Aid in Personal File Search
As the scope of personal data grows, it becomes increasingly difficult to find what we need when we need it. Desktop search tools provide a potential answer, but most existing too...
Sam Shah, Craig A. N. Soules, Gregory R. Ganger, B...