Sciweavers

7640 search results - page 316 / 1528
» Event Database Processing
Sort
View
BNCOD
2009
125views Database» more  BNCOD 2009»
15 years 1 months ago
The Adaptation Model of a Runtime Adaptable DBMS
Nowadays maintenance of database management systems (DBMSs) often requires offline operations for enhancement of functionality or security updates. This hampers the availability of...
Florian Irmert, Thomas Fischer, Frank Lauterwald, ...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ISMIR
2005
Springer
153views Music» more  ISMIR 2005»
15 years 9 months ago
Online Database of Scores in the Humdrum File Format
KernScores, an online library of musical data currently consisting of over 5 million notes, has been created to assist projects dealing with the computational analysis of musical ...
Craig Stuart Sapp
KDD
1997
ACM
131views Data Mining» more  KDD 1997»
15 years 8 months ago
Discovery of Actionable Patterns in Databases: The Action Hierarchy Approach
An approach to defining actionability as a measure of interestingness of patterns is proposed. This approach is based on the concept of an action hierarchy which is defined as a t...
Gediminas Adomavicius, Alexander Tuzhilin
DATAMINE
1999
80views more  DATAMINE 1999»
15 years 3 months ago
MSQL: A Query Language for Database Mining
The tremendous number of rules generated in the mining process makes it necessary for any good data mining system to provide for powerful query primitives to post-process the gener...
Tomasz Imielinski, Aashu Virmani