Sciweavers

1116 search results - page 108 / 224
» Domination Mining and Querying
Sort
View
VLDB
1998
ACM
105views Database» more  VLDB 1998»
14 years 2 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...
PVLDB
2010
93views more  PVLDB 2010»
13 years 8 months ago
Distributed Threshold Querying of General Functions by a Difference of Monotonic Representation
The goal of a threshold query is to detect all objects whose score exceeds a given threshold. This type of query is used in many settings, such as data mining, event triggering, a...
Guy Sagy, Daniel Keren, Izchak Sharfman, Assaf Sch...
ICDE
2010
IEEE
199views Database» more  ICDE 2010»
14 years 10 months ago
Fuzzy Matching of Web Queries to Structured Data
Recognizing the alternative ways people use to reference an entity, is important for many Web applications that query structured data. In such applications, there is often a mismat...
Tao Cheng, Hady Wirawan Lauw, Stelios Paparizos
CNSR
2007
IEEE
181views Communications» more  CNSR 2007»
14 years 2 months ago
The Application of Users' Collective Experience for Crafting Suitable Search Engine Query Recommendations
Search engines have turned into one of the most important services of the Web that are frequently visited by any user. They assist their users in finding appropriate information. ...
Faezeh Ensan, Ebrahim Bagheri, Mohsen Kahani
ICPP
2006
IEEE
14 years 4 months ago
Adaptively Routing P2P Queries Using Association Analysis
Unstructured peer-to-peer networks have become a very popular method for content distribution in the past few years. By not enforcing strict rules on the network’s topology or c...
Brian D. Connelly, Christopher W. Bowron, Li Xiao,...