Sciweavers

1533 search results - page 96 / 307
» Ordering the attributes of query results
Sort
View
OPODIS
2004
13 years 9 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...
ISMIR
2004
Springer
87views Music» more  ISMIR 2004»
14 years 1 months ago
Search Effectiveness Measures for Symbolic Music Queries in Very Large Databases
In the interest of establishing robust benchmarks for search efficiency, we conducted a series of tests on symbolic databases of musical incipits and themes taken from several di...
Craig Stuart Sapp, Yi-Wen Liu, Eleanor Selfridge-F...
PODS
1999
ACM
160views Database» more  PODS 1999»
14 years 1 days ago
Queries with Incomplete Answers over Semistructured Data
Semistructured data occur in situations where information lacks a homogeneous structure and is incomplete. Yet, up to now the incompleteness of information has not been re ected b...
Yaron Kanza, Werner Nutt, Yehoshua Sagiv
ICCBR
2009
Springer
14 years 2 months ago
A Value Supplementation Method for Case Bases with Incomplete Information
Abstract. In this paper we present a method for supplementing incomplete cases with information from other cases within a case base. The acquisition of complete and correct cases i...
Kerstin Bach, Meike Reichle, Klaus-Dieter Althoff
BIRTHDAY
2005
Springer
14 years 1 months ago
Graph Transformation with Variables
Abstract. Variables make rule-based systems more abstract and expressive, as witnessed by term rewriting systems and two-level grammars. In this paper we show that variables can be...
Berthold Hoffmann