Sciweavers

3377 search results - page 90 / 676
» Describing differences between databases
Sort
View
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
15 years 9 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
137
Voted
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 9 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
118
Voted
ISMIR
2005
Springer
151views Music» more  ISMIR 2005»
15 years 8 months ago
Lyrics Recognition from a Singing Voice Based on Finite State Automaton for Music Information Retrieval
Recently, several music information retrieval (MIR) systems have been developed which retrieve musical pieces by the user’s singing voice. All of these systems use only the melo...
Toru Hosoya, Motoyuki Suzuki, Akinori Ito, Shozo M...
155
Voted
DOLAP
2000
ACM
15 years 7 months ago
Automatically Generating OLAP Schemata from Conceptual Graphical Models
Generating tool specific schemata and configuration information for OLAP database tools from conceptual graphical models is an important prerequisite for a comprehensive tool supp...
Karl Hahn, Carsten Sapia, Markus Blaschka
110
Voted
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
15 years 6 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy