Sciweavers

1830 search results - page 173 / 366
» Implementing a Tamper-Evident Database System
Sort
View
REFLECTION
2001
Springer
14 years 3 months ago
A Hybrid Approach to Separation of Concerns: The Story of SADES
A number of approaches have been proposed to achieve separation of concerns. Although all these approaches form suitable candidates for separating cross-cutting concerns in a syste...
Awais Rashid
BMCBI
2006
166views more  BMCBI 2006»
13 years 10 months ago
SEQOPTICS: a protein sequence clustering system
Background: Protein sequence clustering has been widely used as a part of the analysis of protein structure and function. In most cases single linkage or graph-based clustering al...
Yonghui Chen, Kevin D. Reilly, Alan P. Sprague, Zh...
SIGMOD
2008
ACM
140views Database» more  SIGMOD 2008»
13 years 10 months ago
Near-optimal algorithms for shared filter evaluation in data stream systems
We consider the problem of evaluating multiple overlapping queries defined on data streams, where each query is a conjunction of multiple filters and each filter may be shared acr...
Zhen Liu, Srinivasan Parthasarathy 0002, Anand Ran...
KDD
2012
ACM
202views Data Mining» more  KDD 2012»
12 years 1 months ago
UFIMT: an uncertain frequent itemset mining toolbox
In recent years, mining frequent itemsets over uncertain data has attracted much attention in the data mining community. Unlike the corresponding problem in deterministic data, th...
Yongxin Tong, Lei Chen 0002, Philip S. Yu
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
15 years 15 days ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang