Sciweavers

2386 search results - page 280 / 478
» Database Security 2000
Sort
View
DEXA
2000
Springer
100views Database» more  DEXA 2000»
15 years 7 months ago
Contextualization of OODB Schemas in CROME
View mechanisms, widely used in the relational databases, pose new questions in the object model which captures much more semantics. In this paper, we will focus on inheritance and...
Olivier Caron, Bernard Carré, Laurent Debra...
KDD
2000
ACM
147views Data Mining» more  KDD 2000»
15 years 6 months ago
A self organizing map (SOM) extended model for information discovery in a digital library context
This paper presents the MicroNOMAD Discovering Tool. Its main characteristic is both to provide an user with emergent analyses of a multimedia database content and with querying a...
Jean-Charles Lamirel, Jacques Ducloy, Hager Kammou...
SIGMOD
2000
ACM
173views Database» more  SIGMOD 2000»
15 years 6 months ago
Efficient Algorithms for Mining Outliers from Large Data Sets
In this paper, we propose a novel formulation for distance-based outliers that is based on the distance of a point from its kth nearest neighbor. We rank each point on the basis o...
Sridhar Ramaswamy, Rajeev Rastogi, Kyuseok Shim
WEBDB
2000
Springer
120views Database» more  WEBDB 2000»
15 years 6 months ago
Quilt: An XML Query Language for Heterogeneous Data Sources
The World Wide Web promises to transform human society by making virtually all types of information instantly available everywhere. Two prerequisites for this promise to be realiz...
Donald D. Chamberlin, Jonathan Robie, Daniela Flor...
WEBDB
2000
Springer
136views Database» more  WEBDB 2000»
15 years 6 months ago
An Optimization Technique for Answering Regular Path Queries
Rewriting queries using views is a powerful technique that has applications in data integration, data warehousing and query optimization. Query rewriting in relational databases i...
Gösta Grahne, Alex Thomo