Sciweavers

4955 search results - page 151 / 991
» Multiple Pattern Databases
Sort
View
158
Voted
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 8 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
113
Voted
ICDT
2005
ACM
130views Database» more  ICDT 2005»
15 years 8 months ago
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints
We study the problem of rewriting queries using views in the presence of access patterns, integrity constraints, disjunction, and negation. We provide asymptotically optimal algori...
Alin Deutsch, Bertram Ludäscher, Alan Nash
104
Voted
DEXA
2008
Springer
123views Database» more  DEXA 2008»
15 years 4 months ago
Emerging Pattern Based Classification in Relational Data Mining
The usage of descriptive data mining methods for predictive purposes is a recent trend in data mining research. It is well motivated by the understandability of learned models, the...
Michelangelo Ceci, Annalisa Appice, Donato Malerba
233
Voted
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
16 years 4 months ago
A Generic Framework for Continuous Motion Pattern Query Evaluation
We introduce a novel query type defined over streaming moving object data, namely, the Continuous Motion Pattern (CMP) Queries. A motion pattern is defined as a sequence of distin...
Petko Bakalov, Vassilis J. Tsotras
229
Voted
VLDB
2003
ACM
141views Database» more  VLDB 2003»
16 years 2 months ago
Computing complete answers to queries in the presence of limited access patterns
In data applications such as information integration, there can be limited access patterns to relations, i.e., binding patterns require values to be specified for certain attribut...
Chen Li