Sciweavers

2067 search results - page 314 / 414
» Modeling and exploiting query interactions in database syste...
Sort
View
ICDM
2006
IEEE
164views Data Mining» more  ICDM 2006»
15 years 10 months ago
Unsupervised Learning of Tree Alignment Models for Information Extraction
We propose an algorithm for extracting fields from HTML search results. The output of the algorithm is a database table– a data structure that better lends itself to high-level...
Philip Zigoris, Damian Eads, Yi Zhang
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 9 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
ADC
2006
Springer
156views Database» more  ADC 2006»
15 years 10 months ago
A new approach to intelligent text filtering based on novelty detection
This paper presents an original approach to modelling user’s information need in text filtering environment. This approach relies on a specific novelty detection model which a...
Randa Kassab, Jean-Charles Lamirel
ICDE
2010
IEEE
408views Database» more  ICDE 2010»
15 years 11 months ago
Hive - a petabyte scale data warehouse using Hadoop
— The size of data sets being collected and analyzed in the industry for business intelligence is growing rapidly, making traditional warehousing solutions prohibitively expensiv...
Ashish Thusoo, Joydeep Sen Sarma, Namit Jain, Zhen...
BELL
2000
107views more  BELL 2000»
15 years 4 months ago
Automating software feature verification
A significant part of the call processing software for Lucent's new PathStar access server [FSW98] was checked with automated formal verification techniques. The verification...
Gerard J. Holzmann, Margaret H. Smith