Sciweavers

10820 search results - page 2106 / 2164
» Understanding the
Sort
View
PVLDB
2010
117views more  PVLDB 2010»
13 years 6 months ago
Distance-Based Outlier Detection: Consolidation and Renewed Bearing
Detecting outliers in data is an important problem with interesting applications in a myriad of domains ranging from data cleaning to financial fraud detection and from network i...
Gustavo Henrique Orair, Carlos Teixeira, Ye Wang, ...
PVLDB
2010
125views more  PVLDB 2010»
13 years 6 months ago
MapMerge: Correlating Independent Schema Mappings
One of the main steps towards integration or exchange of data is to design the mappings that describe the (often complex) relationships between the source schemas or formats and t...
Bogdan Alexe, Mauricio A. Hernández, Lucian...
PVLDB
2010
118views more  PVLDB 2010»
13 years 6 months ago
Global Detection of Complex Copying Relationships Between Sources
Web technologies have enabled data sharing between sources but also simplified copying (and often publishing without proper attribution). The copying relationships can be complex...
Xin Dong, Laure Berti-Equille, Yifan Hu, Divesh Sr...
PVLDB
2010
163views more  PVLDB 2010»
13 years 6 months ago
Event Processing - past, present and future
Analysts have marked Event Processing as the most growing segment in enterprise computing during years 2008 and 2009, furthermore, this trend is expected to continue. Many of the ...
Opher Etzion
RAID
2010
Springer
13 years 6 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
« Prev « First page 2106 / 2164 Last » Next »