Sciweavers

2071 search results - page 249 / 415
» Behaviour Management in Database Applications
Sort
View
209
Voted
ICDT
2009
ACM
128views Database» more  ICDT 2009»
16 years 3 months ago
Efficient asymmetric inclusion between regular expression types
The inclusion of Regular Expressions (REs) is the kernel of any type-checking algorithm for XML manipulation languages. XML applications would benefit from the extension of REs wi...
Dario Colazzo, Giorgio Ghelli, Carlo Sartiani
108
Voted
BMCBI
2008
117views more  BMCBI 2008»
15 years 2 months ago
Using a logical model to predict the growth of yeast
Background: A logical model of the known metabolic processes in S. cerevisiae was constructed from iFF708, an existing Flux Balance Analysis (FBA) model, and augmented with inform...
Ken E. Whelan, Ross D. King
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
15 years 7 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
185
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 8 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
158
Voted
CIKM
2008
Springer
15 years 4 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...