Sciweavers

1220 search results - page 221 / 244
» Guided Data Repair
Sort
View
KDD
2000
ACM
115views Data Mining» more  KDD 2000»
14 years 1 months ago
A framework for specifying explicit bias for revision of approximate information extraction rules
Information extraction is one of the most important techniques used in Text Mining. One of the main problems in building information extraction (IE) systems is that the knowledge ...
Ronen Feldman, Yair Liberzon, Binyamin Rosenfeld, ...
ATMOS
2008
139views Optimization» more  ATMOS 2008»
13 years 11 months ago
Efficient On-Trip Timetable Information in the Presence of Delays
Abstract. The search for train connections in state-of-the-art commercial timetable information systems is based on a static schedule. Unfortunately, public transportation systems ...
Lennart Frede, Matthias Müller-Hannemann, Mat...
MKWI
2008
156views Business» more  MKWI 2008»
13 years 11 months ago
Enabling Open Innovation in a World of Ubiquitous Computing - Proposing a Research Agenda
: This article proposes a new Ubiquitous Computing (UC) infrastructure for open access to object data that will come along with a new research agenda especially for the field of Wi...
Detlef Schoder, Christian Schmitt, Kai Fischbach, ...
AAAI
2006
13 years 11 months ago
A Bayesian Network for Outbreak Detection and Prediction
Health care officials are increasingly concerned with knowing early whether an outbreak of a particular disease is unfolding. We often have daily counts of some variable that are ...
Xia Jiang, Garrick L. Wallstrom
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 11 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt