Sciweavers

771 search results - page 64 / 155
» Access Methods and Query Processing Techniques
Sort
View
VLDB
2007
ACM
89views Database» more  VLDB 2007»
14 years 4 months ago
GhostDB: Hiding Data from Prying Eyes
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Christophe Salperwyck, Nicolas Anciaux, Mehdi Benz...
TREC
1996
13 years 11 months ago
ANU/ACSys TREC-5 Experiments
A number of experiments conducted within the framework of the TREC-5 conference and using the Parallel Document Retrieval Engine (PADRE) are reported. Several of the experiments i...
David Hawking, Paul B. Thistlewaite, Peter Bailey
IEEEMSP
2002
IEEE
118views Multimedia» more  IEEEMSP 2002»
14 years 2 months ago
Similarity matching of continuous melody contours for humming querying of melody databases
Music query-by-humming is a challenging problem since the humming query inevitably contains much variation and inaccuracy. Many of the previous methods, which adopt note segmentat...
Yongwei Zhu, Mohan S. Kankanhalli, Qi Tian
SIGMOD
2003
ACM
152views Database» more  SIGMOD 2003»
14 years 10 months ago
Warping Indexes with Envelope Transforms for Query by Humming
A Query by Humming system allows the user to find a song by humming part of the tune. No musical training is needed. Previous query by humming systems have not provided satisfacto...
Yunyue Zhu, Dennis Shasha
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
14 years 4 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...