Sciweavers

494 search results - page 62 / 99
» Heap Building Bounds
Sort
View
SIGMOD
2005
ACM
161views Database» more  SIGMOD 2005»
15 years 11 months ago
Mining Top-k Covering Rule Groups for Gene Expression Data
In this paper, we propose a novel algorithm to discover the topk covering rule groups for each row of gene expression profiles. Several experiments on real bioinformatics datasets...
Gao Cong, Kian-Lee Tan, Anthony K. H. Tung, Xin Xu
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
15 years 11 months ago
Constrained Optimalities in Query Personalization
Personalization is a powerful mechanism that helps users to cope with the abundance of information on the Web. Database query personalization achieves this by dynamically construc...
Georgia Koutrika, Yannis E. Ioannidis
SIGMOD
2002
ACM
114views Database» more  SIGMOD 2002»
15 years 11 months ago
Time-parameterized queries in spatio-temporal databases
Time-parameterized queries (TP queries for short) retrieve (i) the actual result at the time that the query is issued, (ii) the validity period of the result given the current mot...
Yufei Tao, Dimitris Papadias
EDBT
2004
ACM
192views Database» more  EDBT 2004»
15 years 11 months ago
LIMBO: Scalable Clustering of Categorical Data
Abstract. Clustering is a problem of great practical importance in numerous applications. The problem of clustering becomes more challenging when the data is categorical, that is, ...
Periklis Andritsos, Panayiotis Tsaparas, Ren&eacut...
PERCOM
2006
ACM
15 years 10 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...