Sciweavers

12637 search results - page 2443 / 2528
» Security for Extensible Systems
Sort
View
SIGMOD
2008
ACM
90views Database» more  SIGMOD 2008»
14 years 10 months ago
Toward best-effort information extraction
Current approaches to develop information extraction (IE) programs have largely focused on producing precise IE results. As such, they suffer from three major limitations. First, ...
Warren Shen, Pedro DeRose, Robert McCann, AnHai Do...
SIGMOD
2008
ACM
191views Database» more  SIGMOD 2008»
14 years 10 months ago
Efficient aggregation for graph summarization
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
Yuanyuan Tian, Richard A. Hankins, Jignesh M. Pate...
SIGMOD
2008
ACM
157views Database» more  SIGMOD 2008»
14 years 10 months ago
CRD: fast co-clustering on large datasets utilizing sampling-based matrix decomposition
The problem of simultaneously clustering columns and rows (coclustering) arises in important applications, such as text data mining, microarray analysis, and recommendation system...
Feng Pan, Xiang Zhang, Wei Wang 0010
SIGMOD
2007
ACM
188views Database» more  SIGMOD 2007»
14 years 10 months ago
Intel Mash Maker: join the web
Intel? Mash Maker is an interactive tool that tracks what the user is doing and tries to infer what information and visualizations they might find useful for their current task. M...
Robert Ennals, Eric A. Brewer, Minos N. Garofalaki...
SIGMOD
2007
ACM
413views Database» more  SIGMOD 2007»
14 years 10 months ago
Effective keyword-based selection of relational databases
The wide popularity of free-and-easy keyword based searches over World Wide Web has fueled the demand for incorporating keyword-based search over structured databases. However, mo...
Bei Yu, Guoliang Li, Karen R. Sollins, Anthony K. ...
« Prev « First page 2443 / 2528 Last » Next »