Sciweavers

1000 search results - page 132 / 200
» Provenance for Aggregate Queries
Sort
View
DAWAK
2003
Springer
14 years 3 months ago
Automatic Detection of Structural Changes in Data Warehouses
Data Warehouses provide sophisticated tools for analyzing complex data online, in particular by aggregating data along dimensions spanned by master data. Changes to these master da...
Johann Eder, Christian Koncilia, Dieter Mitsche
ECOOPW
1999
Springer
14 years 2 months ago
Outdating Outdated Objects
In many application scenarios the database is changing quite rapidly. Because the management of such data is rather expensive and cumbersome, many applications like data warehouse...
Holger Riedel
ECOWS
2006
Springer
14 years 1 months ago
WSMO-MX: A Logic Programming Based Hybrid Service Matchmaker
In this paper, we present an approach to hybrid semantic web service matching based on both logic programming, and syntactic similarity measurement. The implemented matchmaker, ca...
Frank Kaufer, Matthias Klusch
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 4 months ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers
SIGIR
2006
ACM
14 years 3 months ago
Regularized estimation of mixture models for robust pseudo-relevance feedback
Pseudo-relevance feedback has proven to be an effective strategy for improving retrieval accuracy in all retrieval models. However the performance of existing pseudo feedback meth...
Tao Tao, ChengXiang Zhai