Sciweavers

450 search results - page 90 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
PVLDB
2010
118views more  PVLDB 2010»
13 years 4 months ago
Ten Thousand SQLs: Parallel Keyword Queries Computing
Keyword search in relational databases has been extensively studied. Given a relational database, a keyword query finds a set of interconnected tuple structures connected by fore...
Lu Qin, Jefferey Yu, Lijun Chang
TKDE
2010
189views more  TKDE 2010»
13 years 4 months ago
Projective Distribution of XQuery with Updates
—We investigate techniques to automatically decompose any XQuery query—including updating queries specified by the XQuery Update Facility (XQUF)—into subqueries, that can be ...
Ying Zhang, Nan Tang, Peter A. Boncz
UMUAI
2010
136views more  UMUAI 2010»
13 years 4 months ago
Towards affective camera control in games
Information about interactive virtual environments, such as games, is perceived by users through a virtual camera. While most interactive applications let users control the camera,...
Georgios N. Yannakakis, Héctor Perez Mart&i...
PAMI
2011
13 years 21 days ago
Greedy Learning of Binary Latent Trees
—Inferring latent structures from observations helps to model and possibly also understand underlying data generating processes. A rich class of latent structures are the latent ...
Stefan Harmeling, Christopher K. I. Williams
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
14 years 6 months ago
Scalable pseudo-likelihood estimation in hybrid random fields
Learning probabilistic graphical models from high-dimensional datasets is a computationally challenging task. In many interesting applications, the domain dimensionality is such a...
Antonino Freno, Edmondo Trentin, Marco Gori