Sciweavers

3377 search results - page 440 / 676
» Describing differences between databases
Sort
View
CIDR
2009
136views Algorithms» more  CIDR 2009»
15 years 3 months ago
The Role of Schema Matching in Large Enterprises
To date, the principal use case for schema matching research has been as a precursor for code generation, i.e., constructing mappings between schema elements with the end goal of ...
Ken Smith, Michael Morse, Peter Mork, Maya Hao Li,...
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
15 years 3 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
GRID
2006
Springer
15 years 2 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
IJSI
2008
115views more  IJSI 2008»
15 years 2 months ago
Towards Knowledge Acquisition from Semi-Structured Content
Abstract A rich family of generic Information Extraction (IE) techniques have been developed by researchers nowadays. This paper proposes WebKER, a system for automatically extract...
Xi Bai, Jigui Sun, Haiyan Che, Lian Shi
JISE
2008
108views more  JISE 2008»
15 years 2 months ago
Efficient Discovery of Frequent Continuities by Projected Window List Technology
Mining frequent patterns in databases is a fundamental and essential problem in data mining research. A continuity is a kind of causal relationship which describes a definite temp...
Kuo-Yu Huang, Chia-Hui Chang, Kuo-Zui Lin