Sciweavers

1298 search results - page 224 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
VLDB
2007
ACM
131views Database» more  VLDB 2007»
16 years 2 months ago
Dissemination of compressed historical information in sensor networks
Sensor nodes are small devices that "measure" their environment and communicate feeds of low-level data values to a base station for further processing and archiving. Dis...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 8 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
IDEAS
2009
IEEE
192views Database» more  IDEAS 2009»
15 years 8 months ago
A cluster-based approach to XML similarity joins
A natural consequence of the widespread adoption of XML as standard for information representation and exchange is the redundant storage of large amounts of persistent XML documen...
Leonardo Ribeiro, Theo Härder, Fernanda S. Pi...
EDBT
1998
ACM
155views Database» more  EDBT 1998»
15 years 6 months ago
Improving the Query Performance of High-Dimensional Index Structures by Bulk-Load Operations
Abstract. In this paper, we propose a new bulk-loading technique for high-dimensional indexes which represent an important component of multimedia database systems. Since it is ver...
Stefan Berchtold, Christian Böhm, Hans-Peter ...
ICDE
2002
IEEE
104views Database» more  ICDE 2002»
16 years 3 months ago
Efficient Evaluation of Queries with Mining Predicates
Modern relational database systems are beginning to support ad hoc queries on mining models. In this paper, we explore novel techniques for optimizing queries that apply mining mo...
Surajit Chaudhuri, Vivek R. Narasayya, Sunita Sara...