Sciweavers

1922 search results - page 61 / 385
» ie 2007
Sort
View
DBSEC
2006
144views Database» more  DBSEC 2006»
13 years 10 months ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
DMIN
2006
126views Data Mining» more  DMIN 2006»
13 years 10 months ago
An Algorithm for the Discovery of Arbitrary Length Ordinal Association Rules
Association rule mining techniques are used to search attribute-value pairs that occur frequently together in a data set. Ordinal association rules are a particular type of associa...
Alina Campan, Gabriela Serban, Traian Marius Truta...
GEOINFO
2004
13 years 10 months ago
Design and Implementation Issues for Explorative Location-based Applications: The NexusRallye
: Explorative Location-based Applications (eLBA), define a new class of applications that rely on both positioning (i.e. location information) and georeferenced information in addi...
Daniela Nicklas, Nicola Hönle, Michael Molten...
EMNLP
2006
13 years 10 months ago
Learning Field Compatibilities to Extract Database Records from Unstructured Text
Named-entity recognition systems extract entities such as people, organizations, and locations from unstructured text. Rather than extract these mentions in isolation, this paper ...
Michael L. Wick, Aron Culotta, Andrew McCallum
EMNLP
2006
13 years 10 months ago
Unsupervised Information Extraction Approach Using Graph Mutual Reinforcement
Information Extraction (IE) is the task of extracting knowledge from unstructured text. We present a novel unsupervised approach for information extraction based on graph mutual r...
Hany Hassan, Ahmed Hassan, Ossama Emam