Sciweavers

2036 search results - page 129 / 408
» Using and Abusing XML
Sort
View
139
Voted
ER
2006
Springer
109views Database» more  ER 2006»
15 years 6 months ago
Oxone: A Scalable Solution for Detecting Superior Quality Deltas on Ordered Large XML Documents
Recently, a number of relational-based approaches for detecting the changes to XML data have been proposed to address the scalability problem of main memory-based approaches (e.g.,...
Erwin Leonardi, Sourav S. Bhowmick
132
Voted
DOLAP
2003
ACM
15 years 8 months ago
Achieving adaptivity for OLAP-XML federations
Motivated by the need for more flexible OLAP systems, this paper presents work on logical integration of external data in OLAP databases, carried out in cooperation between the D...
Dennis Pedersen, Torben Bach Pedersen
AICT
2006
IEEE
104views Communications» more  AICT 2006»
15 years 4 months ago
An Automation of Mail Channels
Mail channels allow an electronic mail (e-mail) user to have multiple points of contact, each with a potentially different policy. For example, a user may have two channels, one fo...
Nicholas M. Boers, Pawel Gburzynski
137
Voted
CEAS
2005
Springer
15 years 4 months ago
Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become commonplace on the internet for protecting free online services from abuse by automated scripts/bots. They are challenges designed to b...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
127
Voted
DEBU
1999
112views more  DEBU 1999»
15 years 2 months ago
Describing and Manipulating XML Data
This paper presents a brief overview of data management using the Extensible Markup Language (XML). It presents the basics of XML and the DTDs used to constrain XML data, and desc...
Sudarshan S. Chawathe