Sciweavers

76 search results - page 15 / 16
» Consequence analysis theory for alarm analysis
Sort
View
WWW
2008
ACM
14 years 8 months ago
Graph theoretical framework for simultaneously integrating visual and textual features for efficient web image clustering
With the explosive growth of Web and the recent development in digital media technology, the number of images on the Web has grown tremendously. Consequently, Web image clustering...
Manjeet Rege, Ming Dong, Jing Hua
SIGMOD
2009
ACM
213views Database» more  SIGMOD 2009»
14 years 7 months ago
Dictionary-based order-preserving string compression for main memory column stores
Column-oriented database systems [19, 23] perform better than traditional row-oriented database systems on analytical workloads such as those found in decision support and busines...
Carsten Binnig, Stefan Hildenbrand, Franz Fär...
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 2 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ECIS
2004
13 years 8 months ago
Beyond Knowledge Management - Introducing a framework for Learning Management Systems
In the knowledge economy, a firm's intellectual capital represents the only sustainable source of competitive advantage. Intellectual capital manifests itself, predominantly,...
Audrey Dunne, Tom Butler
BMCBI
2010
83views more  BMCBI 2010»
13 years 7 months ago
Trees on networks: resolving statistical patterns of phylogenetic similarities among interacting proteins
Background: Phylogenies capture the evolutionary ancestry linking extant species. Correlations and similarities among a set of species are mediated by and need to be understood in...
William P. Kelly, Michael P. H. Stumpf