Sciweavers

2458 search results - page 247 / 492
» Database-Management Principles And Applications
Sort
View
83
Voted
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 5 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 5 months ago
Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP)
Anomalous windows are the contiguous groupings of data points. In this paper, we propose an approach for discovering anomalous windows using Scan Statistics for Linear Intersectin...
Lei Shi, Vandana Pursnani Janeja
WAIM
2009
Springer
15 years 5 months ago
StreetTiVo: Using a P2P XML Database System to Manage Multimedia Data in Your Living Room
StreetTiVo is a project that aims at bringing research results into the living room; in particular, a mix of current results in the areas of Peer-to-Peer XML Database Management Sy...
Ying Zhang, Arjen P. de Vries, Peter A. Boncz, Djo...
CIKM
2009
Springer
15 years 5 months ago
Scalable learning of collective behavior based on sparse social dimensions
The study of collective behavior is to understand how individuals behave in a social network environment. Oceans of data generated by social media like Facebook, Twitter, Flickr a...
Lei Tang, Huan Liu
ISSTA
2009
ACM
15 years 5 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...