Sciweavers

8701 search results - page 1739 / 1741
» Protecting information on the Web
Sort
View
SIGUCCS
1998
ACM
14 years 24 days ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann
SIGIR
2012
ACM
11 years 11 months ago
TwiNER: named entity recognition in targeted twitter stream
Many private and/or public organizations have been reported to create and monitor targeted Twitter streams to collect and understand users’ opinions about the organizations. Tar...
Chenliang Li, Jianshu Weng, Qi He, Yuxia Yao, Anwi...
ICDE
2008
IEEE
193views Database» more  ICDE 2008»
14 years 10 months ago
DescribeX: Interacting with AxPRE Summaries
DescribeX is a visual, interactive tool for exploring the underlying structure of an XML collection. DescribeX implements a framework for creating XML summaries described using axi...
Mir Sadek Ali, Mariano P. Consens, Shahan Khatchad...
EUROSYS
2006
ACM
14 years 5 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
OTM
2007
Springer
14 years 2 months ago
Translating XPath Queries into SPARQL Queries
Abstract The W3C has developed XPath [3] as a query language for XML data. XPath is embedded in many other languages like XQuery and XSLT. The name of XPath derives from its basic ...
Matthias Droop, Markus Flarer, Jinghua Groppe, Sve...
« Prev « First page 1739 / 1741 Last » Next »