Sciweavers

2226 search results - page 411 / 446
» Scalable Trigger Processing
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 2 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
236
Voted
SIGMOD
2009
ACM
269views Database» more  SIGMOD 2009»
16 years 2 months ago
Efficient approximate entity extraction with edit distance constraints
Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respe...
Wei Wang 0011, Chuan Xiao, Xuemin Lin, Chengqi Zha...
211
Voted
SIGMOD
2008
ACM
164views Database» more  SIGMOD 2008»
16 years 2 months ago
Relational-style XML query
We study the problem of querying relational data embedded in XML. Relational data can be represented by various tree structures in XML. However, current XML query methods, such as...
Taro L. Saito, Shinichi Morishita
219
Voted
SIGMOD
2008
ACM
164views Database» more  SIGMOD 2008»
16 years 2 months ago
Finding frequent items in probabilistic data
Computing statistical information on probabilistic data has attracted a lot of attention recently, as the data generated from a wide range of data sources are inherently fuzzy or ...
Qin Zhang, Feifei Li, Ke Yi
212
Voted
SIGMOD
2007
ACM
125views Database» more  SIGMOD 2007»
16 years 2 months ago
Optimizing mpf queries: decision support and probabilistic inference
Managing uncertain data using probabilistic frameworks has attracted much interest lately in the database literature, and a central computational challenge is probabilistic infere...
Héctor Corrada Bravo, Raghu Ramakrishnan