Sciweavers

992 search results - page 31 / 199
» Dependencies to Optimize Ontology Based Data Access
Sort
View
KDD
2000
ACM
142views Data Mining» more  KDD 2000»
13 years 11 months ago
Automating exploratory data analysis for efficient data mining
Having access to large data sets for the purpose of predictive data mining does not guarantee good models, even when the size of the training data is virtually unlimited. Instead,...
Jonathan D. Becher, Pavel Berkhin, Edmund Freeman
DASFAA
2010
IEEE
141views Database» more  DASFAA 2010»
14 years 2 months ago
Optimizing Write Performance for Read Optimized Databases
Compression in column-oriented databases has been proven to offer both performance enhancements and reductions in storage consumption. This is especially true for read access as c...
Jens Krüger, Martin Grund, Christian Tinnefel...
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
AI
2007
Springer
14 years 1 months ago
Learning the Semantic Meaning of a Concept from the Web
Many researchers have used text classification method in solving the ontology mapping problem. Their mapping results heavily depend on the availability of quality exemplars used as...
Yang Yu, Yun Peng
IJMTM
2007
123views more  IJMTM 2007»
13 years 7 months ago
Semantic enterprise application integration standards
Large, industry-wide interoperability projects use syntax-based standards approaches to accomplish interoperable data exchange among enterprise applications. We are investigating S...
Nenad Anicic, Zoran Marjanovic, Nenad Ivezic, Albe...