Sciweavers

10997 search results - page 2038 / 2200
» On the Structure of Complete Sets
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
SIGMOD
2008
ACM
103views Database» more  SIGMOD 2008»
14 years 10 months ago
XArch: archiving scientific and reference data
Database archiving is important for the retrieval of old versions of a database and for temporal queries over the history of data. We demonstrate XArch, a management system for ma...
Heiko Müller, Ioannis Koltsidas, Peter Bunema...
SIGMOD
2006
ACM
138views Database» more  SIGMOD 2006»
14 years 10 months ago
Context-sensitive ranking
The original PageRank algorithm for improving the ranking of search-query results computes a single vector, using the link structure of the Web, to capture the relative "impor...
Rakesh Agrawal, Ralf Rantzau, Evimaria Terzi
SIGMOD
2002
ACM
181views Database» more  SIGMOD 2002»
14 years 10 months ago
Archiving scientific data
This report is part of the seminar Digital Information Curation held by Prof. Dr. Marc H. Scholl and Dr. Andr?e Seifert during the winter term 2005/06. Its intention is to summari...
Peter Buneman, Sanjeev Khanna, Keishi Tajima, Wang...
PODS
2006
ACM
137views Database» more  PODS 2006»
14 years 10 months ago
Data exchange: computing cores in polynomial time
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...
Georg Gottlob, Alan Nash
« Prev « First page 2038 / 2200 Last » Next »