Sciweavers

187 search results - page 35 / 38
» Usability evaluation considered harmful (some of the time)
Sort
View
SDM
2004
SIAM
211views Data Mining» more  SDM 2004»
13 years 8 months ago
Using Support Vector Machines for Classifying Large Sets of Multi-Represented Objects
Databases are a key technology for molecular biology which is a very data intensive discipline. Since molecular biological databases are rather heterogeneous, unification and data...
Hans-Peter Kriegel, Peer Kröger, Alexey Pryak...
TOMACS
2011
139views more  TOMACS 2011»
13 years 1 months ago
The double CFTP method
We consider the problem of the exact simulation of random variables Z that satisfy the distributional identity Z L = V Y + (1 − V )Z, where V ∈ [0, 1] and Y are independent, an...
Luc Devroye, Lancelot F. James
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 8 months ago
Reasoning About Approximate Match Query Results
Join techniques deploying approximate match predicates are fundamental data cleaning operations. A variety of predicates have been utilized to quantify approximate match in such o...
Sudipto Guha, Nick Koudas, Divesh Srivastava, Xiao...
ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 1 months ago
Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network
— In recent years, many high-speed congestion control (HSCC) algorithms have been proposed for utilizing network pipes with huge bandwidth-delay product (BDP), and some of them h...
Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
14 years 1 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin