Sciweavers

2492 search results - page 409 / 499
» Ontology-based Database Access
Sort
View
WWW
2006
ACM
14 years 10 months ago
Semantic link based top-K join queries in P2P networks
An important issue arising from Peer-to-Peer applications is how to accurately and efficiently retrieve a set of K best matching data objects from different sources while minimizi...
Jie Liu, Liang Feng, Chao He
CHI
2004
ACM
14 years 10 months ago
WaveLens: a new view onto Internet search results
Internet search results are typically displayed as a list conforming to a static style sheet. The difficulty of perusing this list can be exacerbated when screen real estate is li...
Tim Paek, Susan T. Dumais, Ron Logan
PERCOM
2005
ACM
14 years 9 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
SODA
2010
ACM
196views Algorithms» more  SODA 2010»
14 years 7 months ago
Deletion Without Rebalancing in Balanced Binary Trees
We address the vexing issue of deletions in balanced trees. Rebalancing after a deletion is generally more complicated than rebalancing after an insertion. Textbooks neglect delet...
Siddhartha Sen, Robert E. Tarjan
APSCC
2009
IEEE
14 years 4 months ago
On analyzing and specifying concerns for data as a service
—Providing data as a service has not only fostered the access to data from anywhere at anytime but also reduced the cost of investment. However, data is often associated with var...
Hong Linh Truong, Schahram Dustdar