Sciweavers

204 search results - page 23 / 41
» Containment of Conjunctive Queries with Negation: Algorithms...
Sort
View
ICDE
2010
IEEE
254views Database» more  ICDE 2010»
14 years 8 months ago
Efficient Rank Based KNN Query Processing Over Uncertain Data
Uncertain data are inherent in many applications such as environmental surveillance and quantitative economics research. As an important problem in many applications, KNN query has...
Ying Zhang, Xuemin Lin, Gaoping ZHU, Wenjie Zhang,...
IAW
2003
IEEE
14 years 2 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
SE
2008
13 years 10 months ago
Static Bug Detection Through Analysis of Inconsistent Clones
Existing software systems contain a significant amount of duplicated code. Such redundancy can negatively impact program correctness, since inconsistent updates to duplicated code ...
Elmar Jürgens, Benjamin Hummel, Florian Deiss...
CIKM
2007
Springer
14 years 3 months ago
Opinion retrieval from blogs
Opinion retrieval is a document retrieval process, which requires documents to be retrieved and ranked according to their opinions about a query topic. A relevant document must sa...
Wei Zhang, Clement T. Yu, Weiyi Meng
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 3 months ago
Finding frequent co-occurring terms in relational keyword search
Given a set Q of keywords, conventional keyword search (KS) returns a set of tuples, each of which (i) is obtained from a single relation, or by joining multiple relations, and (i...
Yufei Tao, Jeffrey Xu Yu