Sciweavers

DMIN
2007
110views Data Mining» more  DMIN 2007»
13 years 11 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder
DAGSTUHL
2007
13 years 11 months ago
From Algebraic Riccati equations to unilateral quadratic matrix equations: old and new algorithms
The problem of reducing an algebraic Riccati equation XCX − AX − XD + B = 0 to a unilateral quadratic matrix equation (UQME) of the kind PX2 + QX + R = 0 is analyzed. New redu...
Dario Andrea Bini, Beatrice Meini, Federico Poloni
CIDR
2007
105views Algorithms» more  CIDR 2007»
13 years 11 months ago
A Dataspace Odyssey: The iMeMex Personal Dataspace Management System (Demo)
Lukas Blunschi, Jens-Peter Dittrich, Olivier Ren&e...
CIDR
2007
111views Algorithms» more  CIDR 2007»
13 years 11 months ago
Moirae: History-Enhanced Monitoring
In this paper, we investigate the benefits and challenges of integrating history into a near-real-time monitoring system; and present a general purpose continuous monitoring engi...
Magdalena Balazinska, YongChul Kwon, Nathan Kuchta...
CIDR
2007
100views Algorithms» more  CIDR 2007»
13 years 11 months ago
Database Cracking
Database indices provide a non-discriminative navigational infrastructure to localize tuples of interest. Their maintenance cost is taken during database updates. In this paper, w...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
CIDR
2007
116views Algorithms» more  CIDR 2007»
13 years 11 months ago
Life beyond Distributed Transactions: an Apostate's Opinion
Many decades of work have been invested in the area of distributed transactions including protocols such as 2PC, Paxos, and various approaches to quorum. These protocols provide t...
Pat Helland
CIDR
2007
106views Algorithms» more  CIDR 2007»
13 years 11 months ago
Isolation Support for Service-based Applications: A Position Paper
In this paper, we propose an approach that provides the benefits of isolation in service-oriented applications where it is not feasible to use the traditional locking mechanisms u...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...
CIDR
2007
133views Algorithms» more  CIDR 2007»
13 years 11 months ago
SASE: Complex Event Processing over Streams (Demo)
Daniel Gyllstrom, Eugene Wu 0002, Hee-Jin Chae, Ya...