Sciweavers

2797 search results - page 102 / 560
» Code query by example
Sort
View
148
Voted
WEBI
2009
Springer
15 years 9 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
140
Voted
DATESO
2009
158views Database» more  DATESO 2009»
15 years 13 days ago
Benchmarking Coding Algorithms for the R-tree Compression
Multi-dimensional data structures have been widely applied in many data management fields. Spatial data indexing is their natural application, however there are many applications i...
Jirí Walder, Michal Krátký, R...
121
Voted
CIKM
1999
Springer
15 years 7 months ago
Rule-Based Query Optimization, Revisited
We present the architecture and a performance assessment of an extensible query optimizer written in Venus. Venus is a general-purpose active-database rule language embedded in C+...
Lane Warshaw, Daniel P. Miranker
117
Voted
ECCV
2008
Springer
16 years 4 months ago
Improving People Search Using Query Expansions
In this paper we are interested in finding images of people on the web, and more specifically within large databases of captioned news images. It has recently been shown that visua...
Thomas Mensink, Jakob J. Verbeek
121
Voted
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
16 years 2 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...