Sciweavers

912 search results - page 169 / 183
» Model and Schema Registry
Sort
View
DMIN
2006
131views Data Mining» more  DMIN 2006»
13 years 11 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
ISMB
1998
13 years 11 months ago
Advanced Query Mechanisms for Biological Databases
Existing query interfaces for biological databases are either based on fixed forms or textual query languages. Users of a fixed form-based query interface are limited to performin...
I-Min A. Chen, Anthony Kosky, Victor M. Markowitz,...
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
14 years 7 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...
EDBT
2009
ACM
186views Database» more  EDBT 2009»
14 years 4 months ago
Automating the loading of business process data warehouses
Business processes drive the operations of an enterprise. In the past, the focus was primarily on business process design, modeling, and automation. Recently, enterprises have rea...
Malú Castellanos, Alkis Simitsis, Kevin Wil...
DEXA
2009
Springer
127views Database» more  DEXA 2009»
14 years 4 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder