Sciweavers

3652 search results - page 59 / 731
» A study of query length
Sort
View
ICDM
2006
IEEE
122views Data Mining» more  ICDM 2006»
14 years 1 months ago
Optimal Segmentation Using Tree Models
Sequence data are abundant in application areas such as computational biology, environmental sciences, and telecommunications. Many real-life sequences have a strong segmental str...
Robert Gwadera, Aristides Gionis, Heikki Mannila
CDC
2009
IEEE
103views Control Systems» more  CDC 2009»
14 years 16 days ago
Networked state estimation over a Gilbert-Elliot type channel
Abstract— We characterize the stability and achievable performance of networked estimation under correlated packet losses described by the Gilbert-Elliot model. For scalar contin...
Peter Almstrom, Maben Rabi, Mikael Johansson
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
14 years 2 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
ICDM
2006
IEEE
114views Data Mining» more  ICDM 2006»
14 years 1 months ago
Incremental Mining of Frequent Query Patterns from XML Queries for Caching
Existing studies for mining frequent XML query patterns mainly introduce a straightforward candidate generate-and-test strategy and compute frequencies of candidate query patterns...
Guoliang Li, Jianhua Feng, Jianyong Wang, Yong Zha...
FSE
2007
Springer
105views Cryptology» more  FSE 2007»
14 years 2 months ago
New Bounds for PMAC, TMAC, and XCBC
We provide new security proofs for PMAC, TMAC, and XCBC message authentication modes. The previous security bounds for these modes were σ2 /2n , where n is the block size in bits ...
Kazuhiko Minematsu, Toshiyasu Matsushima