Sciweavers

201 search results - page 33 / 41
» Supporting ad hoc Analyses on Enterprise Models
Sort
View
ML
2010
ACM
141views Machine Learning» more  ML 2010»
13 years 6 months ago
Relational retrieval using a combination of path-constrained random walks
Scientific literature with rich metadata can be represented as a labeled directed graph. This graph representation enables a number of scientific tasks such as ad hoc retrieval o...
Ni Lao, William W. Cohen
SIGMOD
2008
ACM
193views Database» more  SIGMOD 2008»
14 years 7 months ago
Efficient provenance storage
Scientific workflow systems are increasingly used to automate complex data analyses, largely due to their benefits over traditional approaches for workflow design, optimization, a...
Adriane Chapman, H. V. Jagadish, Prakash Ramanan
MMMACNS
2010
Springer
13 years 6 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 1 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
CORR
2007
Springer
146views Education» more  CORR 2007»
13 years 7 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...