Sciweavers

3305 search results - page 84 / 661
» Can we Rely on SQL
Sort
View
ECIR
2006
Springer
13 years 9 months ago
Filtering Obfuscated Email Spam by means of Phonetic String Matching
Rule-based email filters mainly rely on the occurrence of critical words to classify spam messages. However, perceptive obfuscation techniques can be used to elude exact pattern ma...
Valerio Freschi, Andrea Seraghiti, Alessandro Bogl...
CN
2006
114views more  CN 2006»
13 years 7 months ago
Contour maps: Monitoring and diagnosis in sensor networks
Large-scale sensor networks impose energy and communication constraints, thus it is difficult to collect data from each individual sensor node and process it at the sink. In this ...
Xiaoqiao Meng, Thyaga Nandagopal, Li Li, Songwu Lu
MOR
2007
83views more  MOR 2007»
13 years 7 months ago
Secret Correlation in Repeated Games with Imperfect Monitoring
We characterize the maximum payoff that a team can guarantee against another in a class of repeated games with imperfect monitoring. Our result relies on the optimal trade-off fo...
Olivier Gossner, Tristan Tomala
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 9 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
ICDE
2007
IEEE
122views Database» more  ICDE 2007»
14 years 9 months ago
Group Linkage
Poor quality data is prevalent in databases due to a variety of reasons, including transcription errors, lack of standards for recording database fields, etc. To be able to query ...
Byung-Won On, Nick Koudas, Dongwon Lee, Divesh Sri...