Sciweavers

687 search results - page 93 / 138
» Query Transformation for PSJ-Queries
Sort
View
DEBU
2010
139views more  DEBU 2010»
13 years 6 months ago
Refining Information Extraction Rules using Data Provenance
Developing high-quality information extraction (IE) rules, or extractors, is an iterative and primarily manual process, extremely time consuming, and error prone. In each iteratio...
Bin Liu 0002, Laura Chiticariu, Vivian Chu, H. V. ...
FCCM
2011
IEEE
311views VLSI» more  FCCM 2011»
13 years 17 days ago
String Matching in Hardware Using the FM-Index
—String matching is a ubiquitous problem that arises in a wide range of applications in computing, e.g., packet routing, intrusion detection, web querying, and genome analysis. D...
Edward Fernandez, Walid Najjar, Stefano Lonardi
CIDR
2011
224views Algorithms» more  CIDR 2011»
13 years 12 days ago
Transactional Intent
Data state in a data management system such as a database is the result of the transactions performed on that data management system. Approaches such as single-message transaction...
Shel Finkelstein, Thomas Heinzel, Rainer Brendle, ...
EDBT
2011
ACM
225views Database» more  EDBT 2011»
13 years 10 days ago
On (not) indexing quadratic form distance by metric access methods
The quadratic form distance (QFD) has been utilized as an effective similarity function in multimedia retrieval, in particular, when a histogram representation of objects is used...
Tomás Skopal, Tomás Bartos, Jakub Lo...
APPROX
2011
Springer
249views Algorithms» more  APPROX 2011»
12 years 8 months ago
A Canonical Form for Testing Boolean Function Properties
In a well-known result Goldreich and Trevisan (2003) showed that every testable graph property has a “canonical” tester in which a set of vertices is selected at random and the...
Dana Dachman-Soled, Rocco A. Servedio