Sciweavers

179 search results - page 32 / 36
» Managing Databases with Binary Large Objects
Sort
View
IFIP
2001
Springer
14 years 1 days ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
COOPIS
2002
IEEE
14 years 17 days ago
Formal Ontology Engineering in the DOGMA Approach
This paper presents a specifically database-inspired approach (called DOGMA) for engineering formal ontologies, implemented as shared resources used to express agreed formal semant...
Mustafa Jarrar, Robert Meersman
WSDM
2012
ACM
254views Data Mining» more  WSDM 2012»
12 years 3 months ago
Maximizing product adoption in social networks
One of the key objectives of viral marketing is to identify a small set of users in a social network, who when convinced to adopt a product will influence others in the network l...
Smriti Bhagat, Amit Goyal 0002, Laks V. S. Lakshma...
ICDE
2009
IEEE
148views Database» more  ICDE 2009»
14 years 9 months ago
Probabilistic Inference over RFID Streams in Mobile Environments
Abstract-- Recent innovations in RFID technology are enabling large-scale cost-effective deployments in retail, healthcare, pharmaceuticals and supply chain management. The advent ...
Thanh Tran 0002, Charles Sutton, Richard Cocci, Ya...
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
11 years 10 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...