Sciweavers

833 search results - page 104 / 167
» Wallet Databases with Observers
Sort
View
126
Voted
EDBT
2010
ACM
135views Database» more  EDBT 2010»
15 years 6 months ago
Probabilistic ranking over relations
Probabilistic top-k ranking queries have been extensively studied due to the fact that data obtained can be uncertain in many real applications. A probabilistic top-k ranking quer...
Lijun Chang, Jeffrey Xu Yu, Lu Qin, Xuemin Lin
108
Voted
CIKM
2009
Springer
15 years 5 months ago
Mining data streams with periodically changing distributions
Dynamic data streams are those whose underlying distribution changes over time. They occur in a number of application domains, and mining them is important for these applications....
Yingying Tao, M. Tamer Özsu
141
Voted
ANLP
1992
109views more  ANLP 1992»
15 years 3 months ago
The Acquisition of Lexical Knowledge from Combined Machine-Readable Dictionary Sources
This paper is concerned with the question of how to extract lexical knowledge from MachineReadable Dictionaries (MRDs) within a lexical database which integrates a lexicon develop...
Antonio Sanfilippo, Victor Poznanski
130
Voted
DEXAW
2010
IEEE
202views Database» more  DEXAW 2010»
15 years 3 months ago
Identifying Sentence-Level Semantic Content Units with Topic Models
Abstract--Statistical approaches to document content modeling typically focus either on broad topics or on discourselevel subtopics of a text. We present an analysis of the perform...
Leonhard Hennig, Thomas Strecker, Sascha Narr, Ern...
ESE
2008
112views Database» more  ESE 2008»
15 years 2 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey