Sciweavers

3377 search results - page 213 / 676
» Describing differences between databases
Sort
View
DMDW
2003
120views Management» more  DMDW 2003»
15 years 5 months ago
Well-formed data warehouse structures
: Two main problems arise in modelling data warehouse structures. The first consists in establishing an adequate representation of dimensions in order to facilitate and to control ...
Michel Schneider
USENIX
2001
15 years 5 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson
KDD
2002
ACM
140views Data Mining» more  KDD 2002»
16 years 4 months ago
Mining frequent item sets by opportunistic projection
In this paper, we present a novel algorithm OpportuneProject for mining complete set of frequent item sets by projecting databases to grow a frequent item set tree. Our algorithm ...
Junqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han
IEAAIE
1999
Springer
15 years 8 months ago
Knowledge Acquisition Based on Semantic Balance of Internal and External Knowledge
This paper presents a strategy to handle incomplete knowledge during acquisition process. The goal of this research is to develop formal tools that benefit the law of semantic bala...
Vagan Y. Terziyan, Seppo Puuronen
ICDE
2005
IEEE
128views Database» more  ICDE 2005»
16 years 5 months ago
Exploiting Correlated Attributes in Acquisitional Query Processing
Sensor networks and other distributed information systems (such as the Web) must frequently access data that has a high per-attribute acquisition cost, in terms of energy, latency...
Amol Deshpande, Carlos Guestrin, Wei Hong, Samuel ...