Sciweavers

404 search results - page 67 / 81
» Querying Data under Access Limitations
Sort
View
PAKDD
2010
ACM
167views Data Mining» more  PAKDD 2010»
13 years 11 months ago
Resource-Bounded Information Extraction: Acquiring Missing Feature Values on Demand
We present a general framework for the task of extracting specific information “on demand” from a large corpus such as the Web under resource-constraints. Given a database wit...
Pallika Kanani, Andrew McCallum, Shaohan Hu
EDBT
2008
ACM
95views Database» more  EDBT 2008»
14 years 7 months ago
Zerber: r-confidential indexing for distributed documents
To carry out work assignments, small groups distributed within a larger enterprise often need to share documents among themselves while shielding those documents from others'...
Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wol...
CSB
2004
IEEE
152views Bioinformatics» more  CSB 2004»
13 years 11 months ago
EcMLST: An Online Database for Multi Locus Sequence Typing of Pathogenic Escherichia coli
In order to provide a portable and accurate typing system for the unambiguous characterization of pathogenic Escherichia coli isolates to the scientific community, we have constru...
Weihong Qi, David W. Lacher, Alyssa C. Bumbaugh, K...
NETCOOP
2009
Springer
14 years 2 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
CCS
2008
ACM
13 years 9 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann