Sciweavers

4237 search results - page 611 / 848
» A Data Model for XML Databases
Sort
View
151
Voted
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
15 years 10 months ago
Scavenging Complex Genomic Information Using Mobile Code: An Evaluation
Mobile code solutions can improve the performances of applications over the Internet by reducing the amount of data that must be transferred across the network. The research on ge...
Mauro Pezzè, Davide Tosi, Gian Pietro Picco
127
Voted
VLDB
2005
ACM
125views Database» more  VLDB 2005»
15 years 10 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
121
Voted
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 9 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
138
Voted
ICDE
2010
IEEE
248views Database» more  ICDE 2010»
15 years 9 months ago
MashRank: Towards uncertainty-aware and rank-aware mashups
Mashups are situational applications that build data flows to link the contents of multiple Web sources. Often times, ranking the results of a mashup is handled in a materializethe...
Mohamed A. Soliman, Mina Saleeb, Ihab F. Ilyas
131
Voted
CASCON
2004
108views Education» more  CASCON 2004»
15 years 6 months ago
Consistent query answering under inclusion dependencies
For several reasons a database may not satisfy certain integrity constraints (ICs), for example, when it is the result of integrating several independent data sources. However, mo...
Loreto Bravo, Leopoldo E. Bertossi