Sciweavers

1268 search results - page 58 / 254
» One Logic to Use Them All
Sort
View
CACM
1999
92views more  CACM 1999»
13 years 9 months ago
Putting OO Distributed Programming to Work
stractions underlying distributed computing. We attempted to keep our preaims at an abstract and general level. In this column, we make those claims more concrete. More precisely, ...
Pascal Felber, Rachid Guerraoui, Mohamed Fayad
JIB
2007
172views more  JIB 2007»
13 years 9 months ago
The ABC (Analysing Biomolecular Contacts)-database
As protein-protein interactions are one of the basic mechanisms in most cellular processes, it is desirable to understand the molecular details of protein-protein contacts and ult...
Peter Walter, Sam Ansari, Volkhard Helms
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 3 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
AAAI
2007
14 years 8 days ago
Joint Inference in Information Extraction
The goal of information extraction is to extract database records from text or semi-structured sources. Traditionally, information extraction proceeds by first segmenting each ca...
Hoifung Poon, Pedro Domingos
DLOG
2008
14 years 8 days ago
Taming the Infinite Chase: Query Answering under Expressive Relational Constraints
Answering queries posed over knowledge bases is a central problem in knowledge representation and database theory. In databases, query containment is one of the important query op...
Andrea Calì, Georg Gottlob, Michael Kifer