Sciweavers

1476 search results - page 290 / 296
» Designing Communication-intensive Web Applications: a Case S...
Sort
View
ICDE
2000
IEEE
82views Database» more  ICDE 2000»
14 years 8 months ago
Similarity Search for Multidimensional Data Sequences
Time-series data, which are a series of one-dimensional real numbers, have been studied in various database applications. In this paper, we extend the traditional similarity searc...
Seok-Lyong Lee, Seok-Ju Chun, Deok-Hwan Kim, Ju-Ho...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Clone detection in automotive model-based development
Model-based development is becoming an increasingly common development methodology. In important domains like embedded systems already major parts of the code are generated from m...
Benjamin Hummel, Bernhard Schätz, Elmar J&uum...
KDD
2009
ACM
260views Data Mining» more  KDD 2009»
14 years 8 months ago
Enabling analysts in managed services for CRM analytics
Data analytics tools and frameworks abound, yet rapid deployment of analytics solutions that deliver actionable insights from business data remains a challenge. The primary reason...
Indrajit Bhattacharya, Shantanu Godbole, Ajay Gupt...
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 2 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu