Sciweavers

691 search results - page 64 / 139
» Constructing Ensembles from Data Envelopment Analysis
Sort
View
CHI
2006
ACM
14 years 9 months ago
Using hybrid networks for the analysis of online software development communities
Social network-based systems usually suffer from two major limitations: they tend to rely on a single data source (e.g. email traffic), and the form of network patterns is often p...
Yevgeniy Eugene Medynskiy, Nicolas Ducheneaut, Aym...
KDD
2005
ACM
80views Data Mining» more  KDD 2005»
14 years 9 months ago
Wavelet synopsis for data streams: minimizing non-euclidean error
We consider the wavelet synopsis construction problem for data streams where given n numbers we wish to estimate the data by constructing a synopsis, whose size, say B is much sma...
Sudipto Guha, Boulos Harb
ATAL
2005
Springer
14 years 2 months ago
Sift and Sort: Climbing the Semantic Pyramid
Information processing operations in support of intelligence analysis are of two kinds. They may sift relevant data from a larger body, thus reducing its quantity, or sort that dat...
H. Van Dyke Parunak, Peter Weinstein, Paul Chiusan...
VLDB
1987
ACM
109views Database» more  VLDB 1987»
14 years 9 days ago
The Design of the POSTGRES Storage System
This paper presents the design of the storage system for the POSTGRES data base system under construction at Berkeley. It is novel in several ways. First, the storage manager supp...
Michael Stonebraker
RAID
2005
Springer
14 years 2 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...