Sciweavers

2071 search results - page 181 / 415
» Behaviour Management in Database Applications
Sort
View
106
Voted
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 3 months ago
Augmenting the generalized hough transform to enable the mining of petroglyphs
Rock art is an archaeological term for human-made markings on stone. It is believed that there are millions of petroglyphs in North America alone, and the study of this valued cul...
Eamonn J. Keogh, Qiang Zhu 0002, Sang-Hee Lee, Xia...
189
Voted
SIGMOD
2008
ACM
102views Database» more  SIGMOD 2008»
16 years 2 months ago
Stream firewalling of xml constraints
As XML-based messages have become common in many client-server protocols, there is a need to protect application servers from invalid or dangerous messages. This leads to the XML ...
Michael Benedikt, Alan Jeffrey, Ruy Ley-Wild
EDBT
2006
ACM
137views Database» more  EDBT 2006»
16 years 2 months ago
Data Mapping as Search
In this paper, we describe and situate the TUPELO system for data mapping in relational databases. Automating the discovery of mappings between structured data sources is a long st...
George H. L. Fletcher, Catharine M. Wyss
156
Voted
CIKM
2009
Springer
15 years 9 months ago
LoOP: local outlier probabilities
Many outlier detection methods do not merely provide the decision for a single data object being or not being an outlier but give also an outlier score or “outlier factor” sig...
Hans-Peter Kriegel, Peer Kröger, Erich Schube...
99
Voted
CIKM
2009
Springer
15 years 9 months ago
Agglomerating local patterns hierarchically with ALPHA
To increase the relevancy of local patterns discovered from noisy relations, it makes sense to formalize error-tolerance. Our starting point is to address the limitations of state...
Loïc Cerf, Pierre-Nicolas Mougel, Jean-Fran&c...