Sciweavers

1494 search results - page 8 / 299
» Efficient provenance storage
Sort
View
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
15 years 9 months ago
Detecting and resolving unsound workflow views for correct provenance analysis
views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is careful...
Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen
ICDE
2009
IEEE
160views Database» more  ICDE 2009»
14 years 7 months ago
Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting
Data provenance is information that describes how a given data item was produced. The provenance includes source and intermediate data as well as the transformations involved in pr...
Boris Glavic, Gustavo Alonso
WWW
2007
ACM
15 years 10 months ago
Bayesian network based sentence retrieval model
This paper makes an intensive investigation of the application of Bayesian network in sentence retrieval and introduces three Bayesian network based sentence retrieval models with...
Keke Cai, Jiajun Bu, Chun Chen, Kangmiao Liu, Wei ...
ICDIM
2006
IEEE
15 years 3 months ago
Creating an Historical Archive Ontology: Guidelines and Evaluation
Ontologies have been proven invaluable tools both for the semantic web and for personal information management. In the context of a historical archive an ontology may provide mean...
Elena Torou, Akrivi Katifori, Costas Vassilakis, G...
PAISI
2010
Springer
14 years 7 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...