Sciweavers

EDBT
2008
ACM
105views Database» more  EDBT 2008»
13 years 9 months ago
Tailor-made Lock Protocols and their DBMS Integration
Sebastian Bächle, Theo Härder
EDBT
2008
ACM
128views Database» more  EDBT 2008»
13 years 9 months ago
BIBEX: a bibliographic exploration tool based on the DEX graph query engine
Sergio Gómez-Villamor, Gerard Soldevila-Mir...
EDBT
2008
ACM
146views Database» more  EDBT 2008»
13 years 9 months ago
SPARQLing constraints for RDF
The goal of the Semantic Web is to support semantic interoperability between applications exchanging data on the web. The idea heavily relies on data being made available in machi...
Georg Lausen, Michael Meier 0002, Michael Schmidt
EDBT
2008
ACM
160views Database» more  EDBT 2008»
13 years 9 months ago
Taxonomy-superimposed graph mining
New graph structures where node labels are members of hierarchically organized ontologies or taxonomies have become commonplace in different domains, e.g., life sciences. It is a ...
Ali Cakmak, Gultekin Özsoyoglu
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 9 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
DEXAW
2008
IEEE
124views Database» more  DEXAW 2008»
13 years 9 months ago
Weighting Influence of User Behavior in Software Validation
Validation is an essential part of software development, and testing is a practical and widely used approach. The emerging methodology is model-based testing, in which test cases ...
Antonia Bertolino, Emanuela G. Cartaxo, Patr&iacut...
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Meta Analysis within Authorship Verification
In an authorship verification problem one is given writing examples from an author A, and one is asked to determine whether or not each text in fact was written by A. In a more ge...
Benno Stein, Nedim Lipka, Sven Meyer zu Eissen
DEXAW
2008
IEEE
136views Database» more  DEXAW 2008»
13 years 9 months ago
Segmentation of Legislative Documents Using a Domain-Specific Lexicon
The amount of legal information is continuously growing. New legislative documents appear everyday in the Web. Legal documents are produced on a daily basis in briefingformat, cont...
Ismael Hasan, Javier Parapar, Roi Blanco