Sciweavers

833 search results - page 104 / 167
» Wallet Databases with Observers
Sort
View
EDBT
2010
ACM
135views Database» more  EDBT 2010»
14 years 1 months ago
Probabilistic ranking over relations
Probabilistic top-k ranking queries have been extensively studied due to the fact that data obtained can be uncertain in many real applications. A probabilistic top-k ranking quer...
Lijun Chang, Jeffrey Xu Yu, Lu Qin, Xuemin Lin
CIKM
2009
Springer
14 years 1 months ago
Mining data streams with periodically changing distributions
Dynamic data streams are those whose underlying distribution changes over time. They occur in a number of application domains, and mining them is important for these applications....
Yingying Tao, M. Tamer Özsu
ANLP
1992
109views more  ANLP 1992»
13 years 11 months ago
The Acquisition of Lexical Knowledge from Combined Machine-Readable Dictionary Sources
This paper is concerned with the question of how to extract lexical knowledge from MachineReadable Dictionaries (MRDs) within a lexical database which integrates a lexicon develop...
Antonio Sanfilippo, Victor Poznanski
DEXAW
2010
IEEE
202views Database» more  DEXAW 2010»
13 years 11 months ago
Identifying Sentence-Level Semantic Content Units with Topic Models
Abstract--Statistical approaches to document content modeling typically focus either on broad topics or on discourselevel subtopics of a text. We present an analysis of the perform...
Leonhard Hennig, Thomas Strecker, Sascha Narr, Ern...
ESE
2008
112views Database» more  ESE 2008»
13 years 10 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey