Sciweavers

8312 search results - page 1520 / 1663
» Performance data collection using a hybrid approach
Sort
View
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
16 years 1 months ago
QoX-driven ETL design: reducing the cost of ETL consulting engagements
As business intelligence becomes increasingly essential for organizations and as it evolves from strategic to operational, the complexity of Extract-Transform-Load (ETL) processes...
Alkis Simitsis, Kevin Wilkinson, Malú Caste...
SIGMOD
2011
ACM
249views Database» more  SIGMOD 2011»
14 years 4 months ago
FlexMin: a flexible tool for automatic bug isolation in DBMS software
Debugging a database engine is an arduous task due to the complexity of the query workloads and systems. The first step in isolating a bug involves identifying a sequence of step...
Kristi Morton, Nicolas Bruno
113
Voted
CIVR
2008
Springer
125views Image Analysis» more  CIVR 2008»
15 years 3 months ago
(Un)Reliability of video concept detection
Great effort has been made to improve video concept detection and continuous progress has been reported. With the current evaluation method being confined to carefully annotated d...
Jun Yang 0003, Alexander G. Hauptmann
BMCBI
2006
74views more  BMCBI 2006»
15 years 1 months ago
An unsupervised classification scheme for improving predictions of prokaryotic TIS
Background: Although it is not difficult for state-of-the-art gene finders to identify coding regions in prokaryotic genomes, exact prediction of the corresponding translation ini...
Maike Tech, Peter Meinicke
ESORICS
2004
Springer
15 years 7 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
« Prev « First page 1520 / 1663 Last » Next »