Sciweavers

1004 search results - page 88 / 201
» Safe Constraint Queries
Sort
View
WIOPT
2006
IEEE
14 years 2 months ago
Optimizing data replication for expanding ring-based queries in wireless sensor networks
We consider the problem of optimizing the number of replicas for event information in wireless sensor networks, when queries are disseminated using expanding rings. We obtain clos...
Bhaskar Krishnamachari, Joon Ahn
KES
2005
Springer
14 years 2 months ago
Using Relevance Feedback to Learn Both the Distance Measure and the Query in Multimedia Databases
Much of the world’s data is in the form of time series, and many other types of data, such as video, image, and handwriting, can easily be transformed into time series. This fact...
Chotirat (Ann) Ratanamahatana, Eamonn J. Keogh
SAC
2009
ACM
14 years 1 months ago
Discovering XML keys and foreign keys in queries
The XML has undoubtedly become a standard for data representation and manipulation. But most of XML documents are still created without the respective description of their structu...
Martin Necaský, Irena Mlýnková...
SAC
1997
ACM
14 years 1 months ago
Query Planning in Infomaster
Infomaster is an information integration system. It provides integrated access to distributed, heterogeneous information sources, thus giving its users the illusion of a centraliz...
Oliver M. Duschka, Michael R. Genesereth
EDBTW
2006
Springer
14 years 17 days ago
Semantically Correct Query Answers in the Presence of Null Values
For several reasons a database may not satisfy a given set of integrity constraints (ICs), but most likely most of the information in it is still consistent with those ICs; and cou...
Loreto Bravo, Leopoldo E. Bertossi