Sciweavers

313 search results - page 24 / 63
» Using Recon for Data Cleaning
Sort
View
IPCCC
1999
IEEE
13 years 11 months ago
Management policies for non-volatile write caches
Many computer hardware and software architectures buffer data in memory to improve system performance. Volatile disk or file caches are sometimes used to delay the propagation of ...
Theodore R. Haining, Darrell D. E. Long
ICASSP
2010
IEEE
13 years 7 months ago
An estimation method for the relative phase parameters of complex wavelet coefficients in noise
This paper proposes a method to estimate the parameters of the relative phase probability density function (RP pdf) of the complex coefficients when the image is corrupted by add...
Yothin Rakvongthai, Soontorn Oraintara
IRI
2005
IEEE
14 years 1 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
AFP
2004
Springer
14 years 28 days ago
A Functional Shell That Operates on Typed and Compiled Applications
Abstract. Esther is the interactive shell of Famke, a prototype implementation of a strongly typed operating system written in the functional programming language Clean. As usual, ...
Rinus Plasmeijer, Arjen van Weelden
VLDB
2004
ACM
120views Database» more  VLDB 2004»
14 years 26 days ago
Merging the Results of Approximate Match Operations
Data Cleaning is an important process that has been at the center of research interest in recent years. An important end goal of effective data cleaning is to identify the relatio...
Sudipto Guha, Nick Koudas, Amit Marathe, Divesh Sr...