Sciweavers

8087 search results - page 1524 / 1618
» Meta Data Management
Sort
View
SIGMOD
2010
ACM
145views Database» more  SIGMOD 2010»
15 years 2 months ago
How to ConQueR why-not questions
One useful feature that is missing from today’s database systems is an explain capability that enables users to seek clarifications on unexpected query results. There are two t...
Quoc Trung Tran, Chee-Yong Chan
CIKM
2010
Springer
15 years 1 months ago
A probabilistic topic-connection model for automatic image annotation
The explosive increase of image data on Internet has made it an important, yet very challenging task to index and automatically annotate image data. To achieve that end, sophistic...
Xin Chen, Xiaohua Hu, Zhongna Zhou, Caimei Lu, Gai...
IMC
2010
ACM
15 years 1 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
DKE
2010
136views more  DKE 2010»
15 years 1 months ago
Application integration on the user interface level: An ontology-based approach
Integration of software applications can be achieved on different levels: the data level, the business logic level, and the user interface level. Integration on the user interface ...
Heiko Paulheim, Florian Probst
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 10 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
« Prev « First page 1524 / 1618 Last » Next »