Sciweavers

1959 search results - page 270 / 392
» Document Management as a Database Problem
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
15 years 10 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 4 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
15 years 2 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
ICDE
2004
IEEE
111views Database» more  ICDE 2004»
15 years 11 months ago
Modeling Uncertainties in Publish/Subscribe Systems
In the publish/subscribe paradigm, information providers disseminate publications to all consumers who have expressed interest by registering subscriptions. This paradigm has foun...
Haifeng Liu, Hans-Arno Jacobsen
KDD
2009
ACM
208views Data Mining» more  KDD 2009»
15 years 10 months ago
A principled and flexible framework for finding alternative clusterings
The aim of data mining is to find novel and actionable insights in data. However, most algorithms typically just find a single (possibly non-novel/actionable) interpretation of th...
Zijie Qi, Ian Davidson