Sciweavers

1472 search results - page 116 / 295
» Data Warehouse Configuration
Sort
View
AUSDM
2006
Springer
110views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Discovering Debtor Patterns of Centrelink Customers
Data mining is currently becoming an increasingly hot research field, but a large gap still remains between the research of data mining and its application in real-world business....
Yanchang Zhao, Longbing Cao, Yvonne Morrow, Yuming...
SIGMOD
1998
ACM
271views Database» more  SIGMOD 1998»
14 years 9 months ago
Towards On-Line Analytical Mining in Large Databases
Great e orts have been paid in the Intelligent Database Systems Research Lab for the research and development of e cient data mining methods and construction of on-line analytical...
Jiawei Han
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
14 years 10 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ERSA
2010
159views Hardware» more  ERSA 2010»
14 years 8 months ago
Acceleration of FPGA Fault Injection Through Multi-Bit Testing
SRAM-based FPGA devices are an attractive option for data processing on space-based platforms, due to high computational capabilities and a lower power envelope than traditional pr...
Grzegorz Cieslewski, Alan D. George, Adam Jacobs
ER
2005
Springer
186views Database» more  ER 2005»
15 years 3 months ago
Blueprints and Measures for ETL Workflows
Extract-Transform-Load (ETL) workflows are data centric workflows responsible for transferring, cleaning, and loading data from their respective sources to the warehouse. Previous ...
Panos Vassiliadis, Alkis Simitsis, Manolis Terrovi...