Sciweavers

720 search results - page 137 / 144
» Incremental XPath evaluation
Sort
View
VLDB
1999
ACM
151views Database» more  VLDB 1999»
13 years 11 months ago
Cache Conscious Indexing for Decision-Support in Main Memory
As random access memory gets cheaper, it becomes increasingly affordable to build computers with large main memories. We consider decision support workloads within the context of...
Jun Rao, Kenneth A. Ross
KDD
1998
ACM
190views Data Mining» more  KDD 1998»
13 years 11 months ago
Time Series Forecasting from High-Dimensional Data with Multiple Adaptive Layers
This paper describes our work in learning online models that forecast real-valued variables in a high-dimensional space. A 3GB database was collected by sampling 421 real-valued s...
R. Bharat Rao, Scott Rickard, Frans Coetzee
GI
1997
Springer
13 years 11 months ago
Functional Object-Oriented Programming with Object-Gofer
Object-Gofer is a small, practical extension of the functional programming language Gofer incorporating the following ideas from the object-oriented community: objects and toplevel...
Wolfram Schulte, Klaus Achatz
SIGMOD
1996
ACM
151views Database» more  SIGMOD 1996»
13 years 11 months ago
BIRCH: An Efficient Data Clustering Method for Very Large Databases
Finding useful patterns in large datasets has attracted considerable interest recently, and one of the most widely st,udied problems in this area is the identification of clusters...
Tian Zhang, Raghu Ramakrishnan, Miron Livny
CONEXT
2007
ACM
13 years 11 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...