Sciweavers

1335 search results - page 180 / 267
» Privacy in Database Publishing
Sort
View
CAV
2008
Springer
96views Hardware» more  CAV 2008»
15 years 6 months ago
Monitoring Atomicity in Concurrent Programs
We study the problem of monitoring concurrent program runs for atomicity violations. Unearthing fundamental results behind scheduling algorithms in database control, we build space...
Azadeh Farzan, P. Madhusudan
123
Voted
FIMI
2004
123views Data Mining» more  FIMI 2004»
15 years 6 months ago
Surprising Results of Trie-based FIM Algorithms
Trie is a popular data structure in frequent itemset mining (FIM) algorithms. It is memory-efficient, and allows fast construction and information retrieval. Many trie-related tec...
Ferenc Bodon
ESANN
2001
15 years 6 months ago
A computational model of monkey grating cells for oriented repetitive alternating patterns
In 1992 neurophysiologists [5] found an new type of cells in areas V1 and V2 of the monkey primary visual cortex, which they called grating cells. These cells respond vigorously to...
Tino Lourens, Kazuhiro Nakadai, Hiroshi G. Okuno, ...
148
Voted
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 4 months ago
An MAS-Based ETL Approach for Complex Data
: In a data warehousing process, the phase of data integration is crucial. Many methods for data integration have been published in the literature. However, with the development of...
Omar Boussaid, Fadila Bentayeb, Jérôm...
JUCS
2006
97views more  JUCS 2006»
15 years 4 months ago
Plagiarism - A Survey
: Plagiarism in the sense of "theft of intellectual property" has been around for as long as humans have produced work of art and research. However, easy access to the We...
Hermann A. Maurer, Frank Kappe, Bilal Zaka