Sciweavers

1642 search results - page 328 / 329
» A Heuristic Method for Business Process Model Evaluation
Sort
View
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
14 years 5 months ago
Discovering significant OPSM subspace clusters in massive gene expression data
Order-preserving submatrixes (OPSMs) have been accepted as a biologically meaningful subspace cluster model, capturing the general tendency of gene expressions across a subset of ...
Byron J. Gao, Obi L. Griffith, Martin Ester, Steve...
SIGMOD
2004
ACM
164views Database» more  SIGMOD 2004»
14 years 5 months ago
Dynamic Plan Migration for Continuous Queries Over Data Streams
Dynamic plan migration is concerned with the on-the-fly transition from one continuous query plan to a semantically equivalent yet more efficient plan. Migration is important for ...
Yali Zhu, Elke A. Rundensteiner, George T. Heinema...
ACSAC
2005
IEEE
13 years 11 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
JCB
2008
91views more  JCB 2008»
13 years 5 months ago
Computational Quantification of Peptides from LC-MS Data
Liquid chromatography coupled to mass spectrometry (LC-MS) has become a major tool for the study of biological processes. High-throughput LC-MS experiments are frequently conducte...
Ole Schulz-Trieglaff, Rene Hussong, Clemens Gr&oum...
SIGIR
2002
ACM
13 years 4 months ago
Empirical studies in strategies for Arabic retrieval
This work evaluates a few search strategies for Arabic monolingual and cross-lingual retrieval, using the TREC Arabic corpus as the test-bed. The release by NIST in 2001 of an Ara...
Jinxi Xu, Alexander Fraser, Ralph M. Weischedel