Sciweavers

376 search results - page 70 / 76
» Semantics and Evaluation of Top-k Queries in Probabilistic D...
Sort
View
ICDE
1993
IEEE
158views Database» more  ICDE 1993»
13 years 12 months ago
Unification of Temporal Data Models
To add time su port to the relational model, both first normal form (fNF and non-INF appmches have maining within 1NF when time support is added may introduce data redundancy. The...
Christian S. Jensen, Michael D. Soo, Richard T. Sn...
WWW
2008
ACM
14 years 8 months ago
Mining the search trails of surfing crowds: identifying relevant websites from user activity
The paper proposes identifying relevant information sources from the history of combined searching and browsing behavior of many Web users. While it has been previously shown that...
Mikhail Bilenko, Ryen W. White
ENC
2007
IEEE
14 years 2 months ago
fMRI Brain Image Retrieval Based on ICA Components
This manuscript proposes a retrieval system for fMRI brain images. Our goal is to find a similaritymetric to enable us to support queries for “similar tasks” for retrieval on...
Bing Bai, Paul B. Kantor, Ali Shokoufandeh, Debora...
IVC
2008
69views more  IVC 2008»
13 years 7 months ago
Unsupervised texture classification: Automatically discover and classify texture patterns
In this paper, we present a novel approach to classify texture collections. This approach does not require experts to provide annotated training set. Given the image collection, w...
Lei Qin, Qingfang Zheng, Shuqiang Jiang, Qingming ...
ASWEC
2006
IEEE
14 years 1 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...