Sciweavers

71 search results - page 7 / 15
» Call Graph Prefetching for Database Applications
Sort
View
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
14 years 8 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...
90
Voted
ACTAC
1998
71views more  ACTAC 1998»
14 years 9 months ago
On the Information Content of Semi-Structured Databases
In a semi-structured database there is no clear separation between the data and the schema, and the degree to which it is structured depends on the application. Semi-structured da...
Mark Levene
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
15 years 9 months ago
Mining significant graph patterns by leap search
With ever-increasing amounts of graph data from disparate sources, there has been a strong need for exploiting significant graph patterns with user-specified objective functions. ...
Xifeng Yan, Hong Cheng, Jiawei Han, Philip S. Yu
VLDB
1998
ACM
117views Database» more  VLDB 1998»
15 years 1 months ago
DTL's DataSpot: Database Exploration Using Plain Language
DTL's DataSpot is a database publishing tool that enables non-technical end users to explore a database using free-form plain language queries combined with hypertext navigat...
Shaul Dar, Gadi Entin, Shai Geva, Eran Palmon
161
Voted
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
15 years 9 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi