Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJune 2024
Study of Perception and Cognition in Immersive Digital Twins for Robotic Assembly Processes
Virtual, Augmented and Mixed RealityJun 2024, Pages 147–158https://doi.org/10.1007/978-3-031-61044-8_11AbstractToday, various types of extended reality (XR) environments are becoming increasingly used in industrial engineering contexts for design, analysis as well as for training activities. User’s perception plays a key role especially in such XR based ...
- research-articleJune 2023Best Industry Paper
PG-Schema: Schemas for Property Graphs
- Renzo Angles,
- Angela Bonifati,
- Stefania Dumbrava,
- George Fletcher,
- Alastair Green,
- Jan Hidders,
- Bei Li,
- Leonid Libkin,
- Victor Marsault,
- Wim Martens,
- Filip Murlak,
- Stefan Plantikow,
- Ognjen Savkovic,
- Michael Schmidt,
- Juan Sequeda,
- Slawek Staworko,
- Dominik Tomaszuk,
- Hannes Voigt,
- Domagoj Vrgoc,
- Mingxi Wu,
- Dusan Zivkovic
Proceedings of the ACM on Management of Data (PACMMOD), Volume 1, Issue 2Article No.: 198, Pages 1–25https://doi.org/10.1145/3589778Property graphs have reached a high level of maturity, witnessed by multiple robust graph database systems as well as the ongoing ISO standardization effort aiming at creating a new standard Graph Query Language (GQL). Yet, despite documented demand, ...
- research-articleJune 2023
Static Analysis of Graph Database Transformations
PODS '23: Proceedings of the 42nd ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database SystemsJune 2023, Pages 251–261https://doi.org/10.1145/3584372.3588654We investigate graph transformations, defined using Datalog-like rules based on acyclic conjunctive two-way regular path queries (acyclic C2RPQs), and we study two fundamental static analysis problems: type checking and equivalence of transformations in ...
- research-articleAugust 2020
Programming Versus Natural Language: On the Effect of Context on Typing in CS1
ICER '20: Proceedings of the 2020 ACM Conference on International Computing Education ResearchAugust 2020, Pages 204–215https://doi.org/10.1145/3372782.3406272Analyzing keystroke data from students working on essay and programming tasks, we study to what extent the difference in task context influences performance in typing. Using data from two introductory programming courses offered at two separate ...
- research-articleJune 2019
Schemas and Types for JSON Data: From Theory to Practice
SIGMOD '19: Proceedings of the 2019 International Conference on Management of DataJune 2019, Pages 2060–2063https://doi.org/10.1145/3299869.3314032The last few years have seen the fast and ubiquitous diffusion of JSON as one of the most widely used formats for publishing and interchanging data, as it combines the flexibility of semistructured data models with well-known data structures like ...
-
- research-articleSeptember 2016
Schema-aware Extended Annotation Graphs
DocEng '16: Proceedings of the 2016 ACM Symposium on Document EngineeringSeptember 2016, Pages 45–54https://doi.org/10.1145/2960811.2960816Multistructured (M-S) documents were introduced as an answer to the need of ever more expressive data models for scholarly annotation, as experienced in the frame of Digital Humanities. Many proposals go beyond XML, that is the gold standard for ...
- articleAugust 2015
The Leader-in-Social-Network Schema: Perceptions of Network Structure Affect Gendered Attributions of Charisma
Organization Science (INFORMS-ORGS), Volume 26, Issue 4August 2015, Pages 1210–1225https://doi.org/10.1287/orsc.2015.0965Charisma is crucially important for a range of leadership outcomes. Charisma is also in the eye of the beholder-an attribute perceived by followers. Traditional leadership theory has tended to assume charismatic attributions flow to men rather than ...
- research-articleJune 2014
A qualitative think-aloud study of novice programmers' code writing strategies
ITiCSE '14: Proceedings of the 2014 conference on Innovation & technology in computer science educationJune 2014, Pages 279–284https://doi.org/10.1145/2591708.2591762This paper presents part of a larger long term study into the cognitive aspects of the early stages of learning to write computer programs Tasks designed to trigger learning events were used to provide the opportunity to observe student learning, in ...
- posterMay 2013
XML validation: looking backward - strongly typed and flexible XML processing are not incompatible
WWW '13 Companion: Proceedings of the 22nd International Conference on World Wide WebMay 2013, Pages 219–220https://doi.org/10.1145/2487788.2487900One major concept in web development using XML is validation: checking whether some document instance fulfills structural constraints described by some schema. Over the last few years, there has been a growing debate about XML validation, and two main ...
- research-articleOctober 2012
Schema driven distributed user interface generation
INTERACCION '12: Proceedings of the 13th International Conference on Interacción Persona-OrdenadorOctober 2012, Article No.: 1, Pages 1–8https://doi.org/10.1145/2379636.2379637In the last few years many traditional user interfaces have evolved towards "distributed" user ones. Nowadays, the proliferation of mobile devices with increased functionality and computing power, allows that different interaction elements can be ...
- research-articleSeptember 2012
Toward automated schema-directed code revision
DocEng '12: Proceedings of the 2012 ACM symposium on Document engineeringSeptember 2012, Pages 103–106https://doi.org/10.1145/2361354.2361377Updating XQuery programs in accordance with a change of the input XML schema is known to be a time-consuming and error-prone task. We propose an automatic method aimed at helping developers realign the XQuery program with the new schema. First, we ...
- research-articleOctober 2011
The quality of the XML web
CIKM '11: Proceedings of the 20th ACM international conference on Information and knowledge managementOctober 2011, Pages 1719–1724https://doi.org/10.1145/2063576.2063824We collect evidence to answer the following question: Is the quality of the XML documents found on the web sufficient to apply XML technology like XQuery, XPath and XSLT? XML collections from the web have been previously studied statistically, but no ...
- research-articleJuly 2011
Impact of XML Schema Evolution
ACM Transactions on Internet Technology (TOIT), Volume 11, Issue 1Article No.: 4, Pages 1–27https://doi.org/10.1145/1993083.1993087We consider the problem of XML Schema evolution. In the ever-changing context of the web, XML schemas continuously change in order to cope with the natural evolution of the entities they describe. Schema changes have important consequences. First, ...
- research-articleFebruary 2011
An emergent culture model for discerning tag semantics in folksonomies
iConference '11: Proceedings of the 2011 iConferenceFebruary 2011, Pages 552–560https://doi.org/10.1145/1940761.1940837Social bookmarking sites as Flickr, del.icio.us, and CiteULike have incorporated the use of tags as way for users to retrieve photos, URLs, and citations in a way that is personally meaningful and which doesn't require learning taxonomies constructed by ...
- research-articleOctober 2010
Better guidelines, better functionality: how metadata supports the cycle of system improvement at UNT
DCMI '10: Proceedings of the 2010 International Conference on Dublin Core and Metadata ApplicationsOctober 2010, Pages 165–176The University of North Texas (UNT) Libraries recently revised their Metadata Input Guidelines in order to improve usability and accessibility for metadata writers, and to enhance the quality of metadata that drives new features in their digital systems. ...
- articleMay 2010
Automatic generation of XML-based editors for autonomic systems
International Journal of Autonomic Computing (IJAC), Volume 1, Issue 3May 2010, Pages 246–262https://doi.org/10.1504/IJAC.2010.033008Nowadays, autonomic systems are emerging as a promising computing approach which manages itself without external interactions in the case of context changing. Several works have dealt with the design and implementation of autonomic systems. However, few ...
- research-articleFebruary 2010
Receptionist or information kiosk: how do people talk with a robot?
CSCW '10: Proceedings of the 2010 ACM conference on Computer supported cooperative workFebruary 2010, Pages 31–40https://doi.org/10.1145/1718918.1718927The mental structures that people apply towards other people have been shown to influence the way people cooperate with others. These mental structures or schemas evoke behavioral scripts. In this paper, we explore two different scripts, receptionist ...
- research-articleJune 2009
XML schema mappings
PODS '09: Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systemsJune 2009, Pages 33–42https://doi.org/10.1145/1559795.1559801Relational schema mappings have been extensively studied in connection with data integration and exchange problems, but mappings between XML schemas have not received the same amount of attention. Our goal is to develop a theory of expressive XML schema ...
- ArticleMay 2009
A Tool for Automatic Code Generation from Schemas
ICCS 2009: Proceedings of the 9th International Conference on Computational ScienceMay 2009, Pages 63–73https://doi.org/10.1007/978-3-642-01973-9_8Algorithm design is one of the more neglected aspects in programming introduction courses. On the contrary, schemas focus on solution construction, since they gather common characteristics of algorithms, so they can be considered as algorithm cognitive ...
- ArticleJanuary 2009
Data Retrieval and Security Using Lightweight Directory Access Protocol
WKDD '09: Proceedings of the 2009 Second International Workshop on Knowledge Discovery and Data MiningJanuary 2009, Pages 685–688https://doi.org/10.1109/WKDD.2009.175In the present world of communication and information interchange where more and more users are bound to use the same services and data with different access levels, the need for providing protection against potential breach of secured data has gained ...