Sciweavers

1756 search results - page 111 / 352
» Mining Query Logs
Sort
View
STACS
2012
Springer
13 years 8 months ago
Linear-Space Data Structures for Range Mode Query in Arrays
A mode of a multiset S is an element a ∈ S of maximum multiplicity; that is, a occurs at least as frequently as any other element in S. Given an array A[1 : n] of n elements, we...
Timothy M. Chan, Stephane Durocher, Kasper Green L...
90
Voted
ADMA
2006
Springer
101views Data Mining» more  ADMA 2006»
15 years 6 months ago
ZED: Explaining Temporal Variations in Query Volume
We hypothesize that the variance in volume of high-velocity queries over time can be explained by observing that these queries are formulated in response to events in the world tha...
Maojin Jiang, Shlomo Argamon, Abdur Chowdhury, Kus...
KDD
1994
ACM
98views Data Mining» more  KDD 1994»
15 years 4 months ago
Rule Induction for Semantic Query Optimization
Semantic query optimization can dramatically speed up database query answering by knowledge intensive reformulation. But the problem of how to learn required semantic rules has no...
Chun-Nan Hsu, Craig A. Knoblock
BDA
2001
15 years 2 months ago
Query-Driven Knowledge Discovery via OLAP manipulations
We study KDD (Knowledge Discovery in Databases) processes on OLAP (multidimensional and multilevel) data from a query point of view. Focusing on association rule mining, we consid...
Jean-François Boulicaut, Patrick Marcel, Ch...
126
Voted
WEBI
2009
Springer
15 years 7 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham