Sciweavers

745 search results - page 147 / 149
» Comparing Two Approaches for the Recognition of Temporal Exp...
Sort
View
CIKM
2005
Springer
14 years 2 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
BMCBI
2004
150views more  BMCBI 2004»
13 years 8 months ago
Cross-species comparison significantly improves genome-wide prediction of cis-regulatory modules in Drosophila
Background: The discovery of cis-regulatory modules in metazoan genomes is crucial for understanding the connection between genes and organism diversity. It is important to quanti...
Saurabh Sinha, Mark D. Schroeder, Ulrich Unnerstal...
DATAMINE
2000
115views more  DATAMINE 2000»
13 years 8 months ago
Integrating Association Rule Mining with Relational Database Systems: Alternatives and Implications
Data mining on large data warehouses is becoming increasingly important. In support of this trend, we consider a spectrum of architectural alternatives for coupling mining with da...
Sunita Sarawagi, Shiby Thomas, Rakesh Agrawal
ATAL
2009
Springer
14 years 3 months ago
The price of democracy in coalition formation
Whenever rational agents form coalitions to execute tasks, doing so via a decentralized negotiation process—while more robust and democratic—may lead to a loss of efficiency ...
Georgios Chalkiadakis, Edith Elkind, Maria Polukar...
DCOSS
2009
Springer
14 years 3 months ago
Finding Symbolic Bug Patterns in Sensor Networks
Abstract. This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multipl...
Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Ji...