Sciweavers

347 search results - page 22 / 70
» The Next Database Revolution
Sort
View
DGO
2009
88views Education» more  DGO 2009»
13 years 8 months ago
Attribute-value specification in customs fraud detection: a human-aided approach
With the growing importance of foreign commerce comes also greater opportunities for fraudulent behaviour. As such, governments must try to detect frauds as soon as they take plac...
Norton Trevisan Roman, Cristiano D. Ferreira, Luis...
GIS
2006
ACM
13 years 7 months ago
Qualitative polyline similarity testing with applications to query-by-sketch, indexing and classification
We present an algorithm for polyline (and polygon) similarity testing that is based on the double-cross formalism. To determine the degree of similarity between two polylines, the...
Bart Kuijpers, Bart Moelans, Nico Van de Weghe
ICDAR
2011
IEEE
12 years 7 months ago
Fast Key-Word Searching via Embedding and Active-DTW
—In this paper we present a novel approach for fast search of handwritten Arabic word-parts within large lexicons. The algorithm runs through three steps to achieve the required ...
Raid Saabni, Alex Bronstein
ICDE
2006
IEEE
164views Database» more  ICDE 2006»
14 years 9 months ago
A Partition-Based Approach to Graph Mining
Existing graph mining algorithms typically assume that databases are relatively static and can fit into the main memory. Mining of subgraphs in a dynamic environment is currently ...
Junmei Wang, Wynne Hsu, Mong-Li Lee, Chang Sheng
SIGMOD
2006
ACM
129views Database» more  SIGMOD 2006»
14 years 7 months ago
Recovery from "bad" user transactions
User written transaction code is responsible for the "C" in ACID transactions, i.e., taking the database from one consistent state to the next. However, user transaction...
David B. Lomet, Zografoula Vagena, Roger S. Barga