Sciweavers

376 search results - page 65 / 76
» Integrity constraints in trust management
Sort
View
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
16 years 4 days ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
PODS
2005
ACM
130views Database» more  PODS 2005»
15 years 12 months ago
Composition of mappings given by embedded dependencies
Composition of mappings between schemas is essential to support schema evolution, data exchange, data integration, and other data management tasks. In many applications, mappings ...
Alan Nash, Philip A. Bernstein, Sergey Melnik
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
16 years 1 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
ISLPED
2009
ACM
125views Hardware» more  ISLPED 2009»
15 years 6 months ago
Behavior-level observability don't-cares and application to low-power behavioral synthesis
Many techniques for power management employed in advanced RTL synthesis tools rely explicitly or implicitly on observability don’t-care (ODC) conditions. In this paper we presen...
Jason Cong, Bin Liu, Zhiru Zhang
DAC
2006
ACM
15 years 5 months ago
"The IC nanometer race -- what will it take to win?"
: Creating ICs in the nanometer age is a high-stakes race that few companies can afford to compete in – and even fewer can win. Hear how senior technologists from the world’s t...
G. Singer, Philippe Magarshack, Dennis Buss, F.-C....