Sciweavers

1075 search results - page 185 / 215
» Toward a Verified Relational Database Management System
Sort
View
KDD
2006
ACM
123views Data Mining» more  KDD 2006»
14 years 9 months ago
Mining rank-correlated sets of numerical attributes
We study the mining of interesting patterns in the presence of numerical attributes. Instead of the usual discretization methods, we propose the use of rank based measures to scor...
Toon Calders, Bart Goethals, Szymon Jaroszewicz
ISPAN
2009
IEEE
14 years 3 months ago
SoCQ: A Framework for Pervasive Environments
Abstract—Querying non-conventional data sources is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is...
Yann Gripay, Frédérique Laforest, Je...
ICALT
2003
IEEE
14 years 1 months ago
A Conformance Test Suite of Localized LOM Model
Since the approval of IEEE LOM Draft Standard and the advance of network-driven learning technology, a large number of resource database constructors, content developers and learn...
Xin Xiang, Yuanchun Shi, Ling Guo
VLDB
2001
ACM
123views Database» more  VLDB 2001»
14 years 1 months ago
User-Optimizer Communication using Abstract Plans in Sybase ASE
imizer Communication using Abstract Plans in Sybase ASE Query optimizers are error prone, due to both their nature and the increased search space that modern query processing requ...
Mihnea Andrei, Patrick Valduriez
CIKM
2008
Springer
13 years 10 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...