Sciweavers

1756 search results - page 172 / 352
» Mining Query Logs
Sort
View
CSE
2009
IEEE
15 years 9 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
CORR
2008
Springer
132views Education» more  CORR 2008»
15 years 3 months ago
Materialized View Selection by Query Clustering in XML Data Warehouses
XML data warehouses form an interesting basis for decision-support applications that exploit complex data. However, native XML database management systems currently bear limited p...
Hadj Mahboubi, Kamel Aouiche, Jérôme ...
BPM
2008
Springer
142views Business» more  BPM 2008»
15 years 5 months ago
Crosscutting Concern Documentation by Visual Query of Business Processes
Business processes can be very large and may contain several different concerns, scattered across the process and tangled with other concerns. Crosscutting concerns are difficult t...
Chiara Di Francescomarino, Paolo Tonella
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
15 years 8 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
ICDE
2005
IEEE
113views Database» more  ICDE 2005»
16 years 4 months ago
On the Optimal Ordering of Maps and Selections under Factorization
The query optimizer of a database system is confronted with two aspects when handling user-defined functions (UDFs) in query predicates: the vast differences in evaluation costs b...
Thomas Neumann, Sven Helmer, Guido Moerkotte