Sciweavers

150 search results - page 18 / 30
» Detecting anomalous access patterns in relational databases
Sort
View
KDD
1997
ACM
111views Data Mining» more  KDD 1997»
13 years 11 months ago
SIPping from the Data Firehose
When mining large databases, the data extraction problem and the interface between the database and data mining algorithm become important issues. Rather than giving a mining algo...
George H. John, Brian Lent
31
Voted
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
13 years 11 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...
MM
2009
ACM
249views Multimedia» more  MM 2009»
14 years 6 days ago
MyFinder: near-duplicate detection for large image collections
The explosive growth of multimedia data poses serious challenges to data storage, management and search. Efficient near-duplicate detection is one of the required technologies for...
Xin Yang, Qiang Zhu, Kwang-Ting Cheng
APWEB
2010
Springer
14 years 10 days ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
BMCBI
2008
91views more  BMCBI 2008»
13 years 7 months ago
t2prhd: a tool to study the patterns of repeat evolution
Background: The models developed to characterize the evolution of multigene families (such as the birth-and-death and the concerted models) have also been applied on the level of ...
Botond Sipos, Kálmán Somogyi, Istv&a...