Sciweavers

720 search results - page 85 / 144
» Incremental XPath evaluation
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 12 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
IPPS
1997
IEEE
13 years 12 months ago
SPAX: A New Parallel Processing System for Commercial Application
Inthispaper, anewparallel processingsystemforcommercial applications, so called SPAX, is described. SPAX cost-effectively overcomes the SMP limitation by providing scalabilityof t...
Woo-Jong Hahn, Kee-Wook Rim, Soo-Won Kim
TOOLS
1997
IEEE
13 years 12 months ago
The Translator Pattern - External Functionality with Homomorphic Mappings
We describe how to express homomorphic translations with an object-oriented design. This includes a uniform approach to the addition of external functionality to data structures. ...
Thomas Kühne
VLDB
1993
ACM
121views Database» more  VLDB 1993»
13 years 11 months ago
Integrity Constraint and Rule Maintenance in Temporal Deductive Knowledge Bases
The enforcement of semantic integrity constraints in data and knowledge bases constitutea a major performance bottleneck. Integrity constraint simplification methods aim at reduci...
Dimitris Plexousakis
COLT
2004
Springer
13 years 11 months ago
Regret Bounds for Hierarchical Classification with Linear-Threshold Functions
We study the problem of classifying data in a given taxonomy when classifications associated with multiple and/or partial paths are allowed. We introduce an incremental algorithm u...
Nicolò Cesa-Bianchi, Alex Conconi, Claudio ...