Sciweavers

4222 search results - page 802 / 845
» Data Integration for Recommendation Systems
Sort
View
TPDS
2010
199views more  TPDS 2010»
13 years 7 months ago
Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
—One of the major applications of wireless ad hoc networks is to extend the Internet coverage and support pervasive and efficient data dissemination and sharing. To reduce data a...
Yu Huang 0002, Jiannong Cao, Beihong Jin, XianPing...
PODS
2012
ACM
253views Database» more  PODS 2012»
11 years 11 months ago
Local transformations and conjunctive-query equivalence
Over the past several decades, the study of conjunctive queries has occupied a central place in the theory and practice of database systems. In recent years, conjunctive queries h...
Ronald Fagin, Phokion G. Kolaitis

Publication
194views
15 years 7 months ago
Multimedia Satellite Networks and TCP/IP Traffic Transport
To meet an increasing demand for multimedia services and electronic connectivity across the world, satellite networks will play an indispensable role in the deployment of global ne...
Sastri Kota, Mukul Goyal, Rohit Goyal and Raj Jain
VLDB
1999
ACM
140views Database» more  VLDB 1999»
14 years 1 months ago
Distributed Hypertext Resource Discovery Through Examples
We describe the architecture of a hypertext resource discovery system using a relational database. Such a system can answer questions that combine page contents, metadata, and hyp...
Soumen Chakrabarti, Martin van den Berg, Byron Dom
ACSAC
2003
IEEE
14 years 24 days ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...