Results 271 to 280 of about 216,958 (318)
Some of the next articles are maybe not open access.
ACM SIGMOD Record, 1984
This paper presents a knowledge-based approach to the specification, design, implementation, and evolution of database applications The knowledge base consists of 1) facts regarding database objects that are organized into a hierarchy of models, and 2) rules that specify the behavior of objects within a model and among modelsThe model hierarchy ...
Allan Shepherd, Larry Kerschberg
openaire +1 more source
This paper presents a knowledge-based approach to the specification, design, implementation, and evolution of database applications The knowledge base consists of 1) facts regarding database objects that are organized into a hierarchy of models, and 2) rules that specify the behavior of objects within a model and among modelsThe model hierarchy ...
Allan Shepherd, Larry Kerschberg
openaire +1 more source
Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval, 2014
Most existing tag-based social image search engines present search results as a ranked list of images, which cannot be consumed by users in a natural and intuitive manner. In this paper, we present a novel concept-preserving image search results summarization algorithm named Prism.
Boon-Siew Seah +2 more
openaire +1 more source
Most existing tag-based social image search engines present search results as a ranked list of images, which cannot be consumed by users in a natural and intuitive manner. In this paper, we present a novel concept-preserving image search results summarization algorithm named Prism.
Boon-Siew Seah +2 more
openaire +1 more source
Proceedings of the 8th international conference on Mobile systems, applications, and services, 2010
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, without the need for the application writer to reinvent the wheel each time.
Tathagata Das +4 more
openaire +1 more source
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, without the need for the application writer to reinvent the wheel each time.
Tathagata Das +4 more
openaire +1 more source
Proceedings of the 21st ACM international conference on Information and knowledge management, 2012
Online forums provide a channel for users to report and discuss problems related to products and troubleshooting, for faster resolution. These could garner negative publicity if left unattended by the companies. Manually monitoring these massive amounts of discussions is laborious.
Rashmi Gangadharaiah, Rose Catherine
openaire +1 more source
Online forums provide a channel for users to report and discuss problems related to products and troubleshooting, for faster resolution. These could garner negative publicity if left unattended by the companies. Manually monitoring these massive amounts of discussions is laborious.
Rashmi Gangadharaiah, Rose Catherine
openaire +1 more source
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
Nowadays, most mobile applications rely on device screen locking mechanisms for ensuring practical security, which expects the users to explicitly authenticate with a PIN or biometric irrespective of the perceived threats. Owing to this usability issues, many avoid using device locks potentially compromising the security. To overcome the limitations of
Arun Ramakrishnan +3 more
openaire +1 more source
Nowadays, most mobile applications rely on device screen locking mechanisms for ensuring practical security, which expects the users to explicitly authenticate with a PIN or biometric irrespective of the perceived threats. Owing to this usability issues, many avoid using device locks potentially compromising the security. To overcome the limitations of
Arun Ramakrishnan +3 more
openaire +1 more source
Networks as the Pipes and Prisms of the Market1
American Journal of Sociology, 2001Joel Podolny
semanticscholar +1 more source
ACM SIGAda Ada Letters, 1997
This paper presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process. The intermediate representation (IR) for capturing features of computer-based systems during reverse engineering is presented.
openaire +1 more source
This paper presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process. The intermediate representation (IR) for capturing features of computer-based systems during reverse engineering is presented.
openaire +1 more source

