Sciweavers

666 search results - page 122 / 134
» A Practical Approach to Access Heterogeneous and Distributed...
Sort
View
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
14 years 9 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
VLDB
1999
ACM
147views Database» more  VLDB 1999»
14 years 1 months ago
Data-Driven, One-To-One Web Site Generation for Data-Intensive Applications
A data-driven approach can be fruitfully used in the speci cation and automatic generation of data-intensive Web applications, i.e., applications which make large amounts of data ...
Stefano Ceri, Piero Fraternali, Stefano Paraboschi
CD
2004
Springer
14 years 2 months ago
Dynamic Deployment of Executing and Simulating Software Components
Physical boundaries have caused software systems to become less monolithic and more distributed. The trend is progressing to a point where software systems will consist of numerous...
Alexander Egyed
WWW
2004
ACM
14 years 9 months ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...
PERCOM
2005
ACM
14 years 8 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz