Sciweavers

719 search results - page 74 / 144
» Normalizing Incomplete Databases
Sort
View
ICDE
2006
IEEE
130views Database» more  ICDE 2006»
14 years 9 months ago
MIC Framework: An Information-Theoretic Approach to Quantitative Association Rule Mining
We propose a framework, called MIC, which adopts an information-theoretic approach to address the problem of quantitative association rule mining. In our MIC framework, we first d...
Yiping Ke, James Cheng, Wilfred Ng
ICPR
2008
IEEE
14 years 9 months ago
A hierarchical model for the evaluation of biometric sample quality
The evaluation of biometric sample quality is of great importance in the evaluation of biometric algorithms. In this paper, we propose a novel hierarchical model to compute the sa...
Qian He, Tieniu Tan, Yong Zou, Zhenan Sun
SIGMOD
2003
ACM
112views Database» more  SIGMOD 2003»
14 years 8 months ago
A Theory of Redo Recovery
Our goal is to understand redo recovery. We define an installation graph of operations in an execution, an ordering significantly weaker than conflict ordering from concurrency co...
David B. Lomet, Mark R. Tuttle
MIG
2009
Springer
14 years 2 months ago
Motion Pattern Encapsulation for Data-Driven Constraint-Based Motion Editing
The growth of motion capture systems have contributed to the proliferation of human motion database, mainly because human motion is important in many applications, ranging from gam...
Schubert R. Carvalho, Ronan Boulic, Daniel Thalman...
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 2 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas