Sciweavers

2853 search results - page 23 / 571
» On the Efficiency of Provenance Queries
Sort
View
ADBIS
2004
Springer
133views Database» more  ADBIS 2004»
14 years 1 months ago
Evaluation of the Mine-Merge Method for Data Mining Query Processing
In this paper we consider concurrent execution of multiple data mining queries in the context of discovery of frequent itemsets. If such data mining queries operate on similar part...
Marek Wojciechowski, Maciej Zakrzewicz
HICSS
2005
IEEE
122views Biometrics» more  HICSS 2005»
14 years 2 months ago
Expressive and Efficient Peer-to-Peer Queries
It is demonstrated how to provide a peer-to-peer system that supports an expressive query language while maintaining efficient distribution over a wide-area network. The key is to...
Dennis Heimbigner
ACISP
2006
Springer
14 years 7 days ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt
ADBIS
2005
Springer
163views Database» more  ADBIS 2005»
14 years 2 months ago
XML Databases and Beyond - Plenty of Architectural Challenges Ahead
A key observation is that the invariants in database management determine the mapping steps of the supporting architecture. Referring to the multi-layered architecture of record-or...
Theo Härder
NIPS
2004
13 years 9 months ago
Worst-Case Analysis of Selective Sampling for Linear-Threshold Algorithms
We provide a worst-case analysis of selective sampling algorithms for learning linear threshold functions. The algorithms considered in this paper are Perceptron-like algorithms, ...
Nicolò Cesa-Bianchi, Claudio Gentile, Luca ...