Sciweavers

1004 search results - page 183 / 201
» Safe Constraint Queries
Sort
View
IPTPS
2003
Springer
14 years 1 months ago
On the Feasibility of Peer-to-Peer Web Indexing and Search
This paper discusses the feasibility of peer-to-peer full-text keyword search of the Web. Two classes of keyword search techniques are in use or have been proposed: flooding of q...
Jinyang Li, Boon Thau Loo, Joseph M. Hellerstein, ...
MSR
2010
ACM
14 years 1 months ago
The Ultimate Debian Database: Consolidating bazaar metadata for Quality Assurance and data mining
—FLOSS distributions like RedHat and Ubuntu require a lot more complex infrastructures than most other FLOSS projects. In the case of community-driven distributions like Debian, ...
Lucas Nussbaum, Stefano Zacchiroli
PKDD
2009
Springer
184views Data Mining» more  PKDD 2009»
14 years 1 months ago
Boosting Active Learning to Optimality: A Tractable Monte-Carlo, Billiard-Based Algorithm
Abstract. This paper focuses on Active Learning with a limited number of queries; in application domains such as Numerical Engineering, the size of the training set might be limite...
Philippe Rolet, Michèle Sebag, Olivier Teyt...
VLDB
2001
ACM
109views Database» more  VLDB 2001»
14 years 1 months ago
Mining Multi-Dimensional Constrained Gradients in Data Cubes
Constrained gradient analysis (similar to the “cubegrade” problem posed by Imielinski, et al. [9]) is to extract pairs of similar cell characteristics associated with big chan...
Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei...
SIGSOFT
2000
ACM
14 years 1 months ago
COM revisited: tool-assisted modelling of an architectural framework
Designing architectural frameworks without the aid of formal modeling is error prone. But, unless supported by analysis, formal modeling is prone to its own class of errors, in wh...
Daniel Jackson, Kevin J. Sullivan