Sciweavers

61 search results - page 2 / 13
» Mining Violations to Relax Relational Database Constraints
Sort
View
JCP
2006
173views more  JCP 2006»
13 years 5 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
VLDB
1995
ACM
195views Database» more  VLDB 1995»
13 years 9 months ago
Discovery of Multiple-Level Association Rules from Large Databases
Previous studies on mining association rules find rules at single concept level, however, mining association rules at multiple concept levels may lead to the discovery of more spe...
Jiawei Han, Yongjian Fu
WECWIS
2009
IEEE
177views ECommerce» more  WECWIS 2009»
14 years 9 days ago
Business Rules for Concurrent E-commerce Transactions
Business rules are a cornerstone of the consistency management of e-commerce data. The concurrency of transactions by multiple customers of e-commerce services (e.g., seat reserva...
Hendrik Decker
PODS
1999
ACM
153views Database» more  PODS 1999»
13 years 10 months ago
Consistent Query Answers in Inconsistent Databases
In this paper we consider the problem of the logical characterization of the notion of consistent answer in a relational database that may violate given integrity constraints. Thi...
Marcelo Arenas, Leopoldo E. Bertossi, Jan Chomicki
SAC
2004
ACM
13 years 11 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman