Sciweavers

2071 search results - page 208 / 415
» Behaviour Management in Database Applications
Sort
View
SIGMOD
2004
ACM
157views Database» more  SIGMOD 2004»
14 years 10 months ago
Holistic UDAFs at streaming speeds
Many algorithms have been proposed to approximate holistic aggregates, such as quantiles and heavy hitters, over data streams. However, little work has been done to explore what t...
Graham Cormode, Theodore Johnson, Flip Korn, S. Mu...
DEXAW
2005
IEEE
134views Database» more  DEXAW 2005»
14 years 4 months ago
Enabling High Data Availability in a DHT
Many decentralized and peer-to-peer applications require some sort of data management. Besides P2P file-sharing, there are already scenarios (e.g. BRICKS project [3]) that need m...
Predrag Knezevic, Andreas Wombacher, Thomas Risse
CIKM
2009
Springer
14 years 3 months ago
Scalable continuous range monitoring of moving objects in symbolic indoor space
Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., s...
Bin Yang 0002, Hua Lu, Christian S. Jensen
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
13 years 1 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
KDD
2008
ACM
110views Data Mining» more  KDD 2008»
14 years 11 months ago
Mining preferences from superior and inferior examples
Mining user preferences plays a critical role in many important applications such as customer relationship management (CRM), product and service recommendation, and marketing camp...
Bin Jiang, Jian Pei, Xuemin Lin, David W. Cheung, ...