Sciweavers

2351 search results - page 448 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
SIGMOD
2007
ACM
195views Database» more  SIGMOD 2007»
14 years 7 months ago
Effective variation management for pseudo periodical streams
Many database applications require the analysis and processing of data streams. In such systems, huge amounts of data arrive rapidly and their values change over time. The variati...
Lv-an Tang, Bin Cui, Hongyan Li, Gaoshan Miao, Don...
WSDM
2010
ACM
1328views Data Mining» more  WSDM 2010»
14 years 4 months ago
TwitterRank: Finding Topic-sensitive Influential Twitterers
This paper focuses on the problem of identifying influential users of micro-blogging services. Twitter, one of the most notable micro-blogging services, employs a social-networkin...
Jianshu Weng, Ee-peng Lim, Jing Jiang, Qi He
EDBT
2010
ACM
237views Database» more  EDBT 2010»
14 years 1 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
DAC
2009
ACM
14 years 1 months ago
Clock skew optimization via wiresizing for timing sign-off covering all process corners
Manufacturing process variability impacts the performance of synchronous logic circuits by means of its effect on both clock network and functional block delays. Typically, varia...
Sari Onaissi, Khaled R. Heloue, Farid N. Najm
EDBT
2009
ACM
184views Database» more  EDBT 2009»
14 years 1 months ago
Distributed similarity search in high dimensions using locality sensitive hashing
In this paper we consider distributed K-Nearest Neighbor (KNN) search and range query processing in high dimensional data. Our approach is based on Locality Sensitive Hashing (LSH...
Parisa Haghani, Sebastian Michel, Karl Aberer