Sciweavers

722 search results - page 96 / 145
» Data Cleaning: Problems and Current Approaches
Sort
View
EDBT
2004
ACM
131views Database» more  EDBT 2004»
16 years 2 months ago
Declustering Two-Dimensional Datasets over MEMS-Based Storage
Due to the large difference between seek time and transfer time in current disk technology, it is advantageous to perform large I/O using a single sequential access rather than mu...
Hailing Yu, Divyakant Agrawal, Amr El Abbadi
ESWS
2008
Springer
15 years 3 months ago
XSPARQL: Traveling between the XML and RDF Worlds - and Avoiding the XSLT Pilgrimage
With currently available tools and languages, translating between an existing XML format and RDF is a tedious and error-prone task. The importance of this problem is acknowledged b...
Waseem Akhtar, Jacek Kopecký, Thomas Krennw...
IJCAI
1997
15 years 3 months ago
Extracting Propositions from Trained Neural Networks
This paper presents an algorithm for extract­ ing propositions from trained neural networks. The algorithm is a decompositional approach which can be applied to any neural networ...
Hiroshi Tsukimoto
JDA
2008
72views more  JDA 2008»
15 years 1 months ago
Semi-local longest common subsequences in subquadratic time
For two strings a, b of lengths m, n respectively, the longest common subsequence (LCS) problem consists in comparing a and b by computing the length of their LCS. In this paper, ...
Alexander Tiskin
IPPS
2007
IEEE
15 years 8 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh