Sciweavers

836 search results - page 110 / 168
» A Model for Data Warehouse Operational Processes
Sort
View
69
Voted
PVLDB
2010
86views more  PVLDB 2010»
14 years 11 months ago
Thirteen New Players in the Team: A Ferry-based LINQ to SQL Provider
We demonstrate an efficient LINQ to SQL provider and its significant impact on the runtime performance of LINQ programs that process large data volumes. This alternative provider...
Tom Schreiber, Simone Bonetti, Torsten Grust, Manu...
145
Voted
VLDB
2002
ACM
143views Database» more  VLDB 2002»
15 years 7 days ago
SQL Memory Management in Oracle9i
Complex database queries require the use of memory-intensive operators like sort and hashjoin. Those operators need memory, also referred to as SQL memory, to process their input ...
Benoît Dageville, Mohamed Zaït
137
Voted
IEEEARES
2006
IEEE
15 years 6 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
143
Voted
ICPIA
1992
15 years 4 months ago
Parallel Manipulations of Octrees and Quadtrees
Abstract. Octrees o er a powerful means for representing and manipulating 3-D objects. This paper presents an implementation of octree manipulations using a new approach on a share...
Vipin Chaudhary, K. Kamath, Prakash Arunachalam, J...
PAMI
2011
14 years 7 months ago
Greedy Learning of Binary Latent Trees
—Inferring latent structures from observations helps to model and possibly also understand underlying data generating processes. A rich class of latent structures are the latent ...
Stefan Harmeling, Christopher K. I. Williams