Sciweavers

261 search results - page 51 / 53
» Event processing with an oracle database
Sort
View
VLDB
2007
ACM
93views Database» more  VLDB 2007»
14 years 1 months ago
Seeking Stable Clusters in the Blogosphere
The popularity of blogs has been increasing dramatically over the last couple of years. As topics evolve in the blogosphere, keywords align together and form the heart of various ...
Nilesh Bansal, Fei Chiang, Nick Koudas, Frank Wm. ...
CIKM
2006
Springer
13 years 11 months ago
KDDCS: a load-balanced in-network data-centric storage scheme for sensor networks
We propose an In-Network Data-Centric Storage (INDCS) scheme for answering ad-hoc queries in sensor networks. Previously proposed In-Network Storage (INS) schemes suffered from St...
Mohamed Aly, Kirk Pruhs, Panos K. Chrysanthis
FLAIRS
2010
13 years 9 months ago
Handling of Numeric Ranges for Graph-Based Knowledge Discovery
Nowadays, graph-based knowledge discovery algorithms do not consider numeric attributes (they are discarded in the preprocessing step, or they are treated as alphanumeric values w...
Oscar E. Romero, Jesus A. Gonzalez, Lawrence B. Ho...
MTA
2000
165views more  MTA 2000»
13 years 7 months ago
Approximating Content-Based Object-Level Image Retrieval
Object-level image retrieval is an active area of research. Given an image, a human observerdoesnot see randomdots of colors. Rather,he she observesfamiliarobjectsin the image. The...
Wynne Hsu, Tat-Seng Chua, Hung Keng Pung
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw