Sciweavers

889 search results - page 125 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
15 years 10 months ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...
CCS
2007
ACM
15 years 4 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
CIKM
2009
Springer
15 years 1 months ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang
BMCBI
2007
151views more  BMCBI 2007»
14 years 10 months ago
A statistical method to incorporate biological knowledge for generating testable novel gene regulatory interactions from microar
Background: The incorporation of prior biological knowledge in the analysis of microarray data has become important in the reconstruction of transcription regulatory networks in a...
Peter Larsen, Eyad Almasri, Guanrao Chen, Yang Dai
SIGIR
2009
ACM
15 years 4 months ago
Extracting structured information from user queries with semi-supervised conditional random fields
When search is against structured documents, it is beneficial to extract information from user queries in a format that is consistent with the backend data structure. As one step...
Xiao Li, Ye-Yi Wang, Alex Acero