Sciweavers

18697 search results - page 3706 / 3740
» Systemic Security Management
Sort
View
SIGUCCS
2000
ACM
15 years 7 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
DEXA
1995
Springer
126views Database» more  DEXA 1995»
15 years 7 months ago
A Heuristic Approach for Optimization of Path Expressions
Abstract. The object-oriented database management systems store references to objects (implicit joins, precomputed joins), and use path expressions in query languages. One way of e...
Cetin Ozkan, Asuman Dogac, Cem Evrendilek
183
Voted
ICDT
2010
ACM
147views Database» more  ICDT 2010»
15 years 7 months ago
Querying Parse Trees of Stochastic Context-Free Grammars
Stochastic context-free grammars (SCFGs) have long been recognized as useful for a large variety of tasks including natural language processing, morphological parsing, speech reco...
Sara Cohen, Benny Kimelfeld
136
Voted
ACISICIS
2009
IEEE
15 years 7 months ago
A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning
A PCNNs-based square-and-triangle-template method for binary fingerprint image thinning is proposed. The algorithm is iterative, in which a combined sequential and parallel proces...
Dacheng Xu, Bailiang Li, Anton Nijholt
EDBTW
2010
Springer
15 years 7 months ago
Text-to-query: dynamically building structured analytics to illustrate textual content
Successfully structuring information in databases, OLAP cubes, and XML is a crucial element in managing data nowadays. However this process brought new challenges to usability. It...
Raphaël Thollot, Falk Brauer, Wojciech M. Bar...
« Prev « First page 3706 / 3740 Last » Next »