Sciweavers

2071 search results - page 181 / 415
» Behaviour Management in Database Applications
Sort
View
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
14 years 11 months ago
Augmenting the generalized hough transform to enable the mining of petroglyphs
Rock art is an archaeological term for human-made markings on stone. It is believed that there are millions of petroglyphs in North America alone, and the study of this valued cul...
Eamonn J. Keogh, Qiang Zhu 0002, Sang-Hee Lee, Xia...
SIGMOD
2008
ACM
102views Database» more  SIGMOD 2008»
14 years 10 months ago
Stream firewalling of xml constraints
As XML-based messages have become common in many client-server protocols, there is a need to protect application servers from invalid or dangerous messages. This leads to the XML ...
Michael Benedikt, Alan Jeffrey, Ruy Ley-Wild
EDBT
2006
ACM
137views Database» more  EDBT 2006»
14 years 10 months ago
Data Mapping as Search
In this paper, we describe and situate the TUPELO system for data mapping in relational databases. Automating the discovery of mappings between structured data sources is a long st...
George H. L. Fletcher, Catharine M. Wyss
CIKM
2009
Springer
14 years 5 months ago
LoOP: local outlier probabilities
Many outlier detection methods do not merely provide the decision for a single data object being or not being an outlier but give also an outlier score or “outlier factor” sig...
Hans-Peter Kriegel, Peer Kröger, Erich Schube...
CIKM
2009
Springer
14 years 5 months ago
Agglomerating local patterns hierarchically with ALPHA
To increase the relevancy of local patterns discovered from noisy relations, it makes sense to formalize error-tolerance. Our starting point is to address the limitations of state...
Loïc Cerf, Pierre-Nicolas Mougel, Jean-Fran&c...