Sciweavers

1861 search results - page 340 / 373
» 1.6-Bit Pattern Databases
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
15 years 10 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
EDBT
2008
ACM
166views Database» more  EDBT 2008»
15 years 10 months ago
Social ties and their relevance to churn in mobile telecom networks
Social Network Analysis has emerged as a key paradigm in modern sociology, technology, and information sciences. The paradigm stems from the view that the attributes of an individ...
Koustuv Dasgupta, Rahul Singh, Balaji Viswanathan,...
ICDE
2010
IEEE
399views Database» more  ICDE 2010»
15 years 4 months ago
Discovery-driven graph summarization
Abstract— Large graph datasets are ubiquitous in many domains, including social networking and biology. Graph summarization techniques are crucial in such domains as they can ass...
Ning Zhang, Yuanyuan Tian, Jignesh M. Patel
SAC
2009
ACM
15 years 4 months ago
Applying latent dirichlet allocation to group discovery in large graphs
This paper introduces LDA-G, a scalable Bayesian approach to finding latent group structures in large real-world graph data. Existing Bayesian approaches for group discovery (suc...
Keith Henderson, Tina Eliassi-Rad
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 4 months ago
Rule-based multi-query optimization
Data stream management systems usually have to process many long-running queries that are active at the same time. Multiple queries can be evaluated more efficiently together tha...
Mingsheng Hong, Mirek Riedewald, Christoph Koch, J...