Sciweavers

1497 search results - page 203 / 300
» Online Negative Databases
Sort
View
ICDE
2007
IEEE
132views Database» more  ICDE 2007»
16 years 6 months ago
Lira: Lightweight, Region-aware Load Shedding in Mobile CQ Systems
Position updates and query re-evaluations are two predominant, costly components of processing location-based, continual queries (CQs) in mobile systems. To obtain high-quality qu...
Bugra Gedik, Ling Liu, Kun-Lung Wu, Philip S. Yu
ICDT
2009
ACM
125views Database» more  ICDT 2009»
16 years 5 months ago
How big must complete XML query languages be?
Marx and de Rijke have shown that the navigational core of the w3c XML query language XPath is not first-order complete ? that is it cannot express every query definable in firsto...
Clemens Ley, Michael Benedikt
CCS
2009
ACM
16 years 5 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
16 years 5 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 5 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...