Sciweavers

2386 search results - page 235 / 478
» Database Security 2000
Sort
View
VLDB
2000
ACM
118views Database» more  VLDB 2000»
15 years 2 months ago
Decision Tables: Scalable Classification Exploring RDBMS Capabilities
In this paper, we report our success in building efficient scalable classifiers in the form of decision tables by exploring capabilities of modern relational database management s...
Hongjun Lu, Hongyan Liu
COLING
2008
15 years 12 days ago
Construction of an Infrastructure for Providing Users with Suitable Language Resources
Our research organization has been constructing a large scale database named SHACHI by collecting detailed meta information on language resources (LRs) in Asia and Western countri...
Hitomi Tohyama, Shunsuke Kozawa, Kiyotaka Uchimoto...
TREC
2000
15 years 9 days ago
Reflections on "Aboutness" TREC-9 Evaluation Experiments at Justsystem
TREC-9 evaluation experiments at the Justsystem site are described with a focus on "aboutness" based approach in text retrieval. Experiments on the effects of supplement...
Sumio Fujita
AGIS
2000
95views more  AGIS 2000»
14 years 10 months ago
Error Detection through Consistency Checking
Following a brief discussion on various aspects of data quality, possible methods are examined for the detection of errors in a spatial database. Using examples, we introduce the c...
Peng Gong, Lan Mu
IEEEARES
2008
IEEE
15 years 5 months ago
A Critique of k-Anonymity and Some of Its Enhancements
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be repeated at least for k records. It has been shown that k-anonymity alone does...
Josep Domingo-Ferrer, Vicenç Torra