Sciweavers

3639 search results - page 664 / 728
» Provenance as Dependency Analysis
Sort
View
EDBT
2006
ACM
122views Database» more  EDBT 2006»
15 years 10 months ago
TQuEST: Threshold Query Execution for Large Sets of Time Series
Effective and efficient data mining in time series databases is essential in many application domains as for instance in financial analysis, medicine, meteorology, and environmenta...
Johannes Aßfalg, Hans-Peter Kriegel, Peer Kr...
EDBT
2008
ACM
129views Database» more  EDBT 2008»
15 years 10 months ago
Continuous multi-way joins over distributed hash tables
This paper studies the problem of evaluating continuous multi-way joins on top of Distributed Hash Tables (DHTs). We present a novel algorithm, called recursive join (RJoin), that...
Stratos Idreos, Erietta Liarou, Manolis Koubarakis
ICIAP
2007
ACM
15 years 10 months ago
Natural scenes categorization by hierarchical extraction of typicality patterns
Natural scene categorization of images represents a very useful task for automatic image analysis systems in a wide variety of applications. In the literature, several methods hav...
Alessandro Perina, Marco Cristani, Vittorio Murino
ICSE
2004
IEEE-ACM
15 years 10 months ago
Validating the Unit Correctness of Spreadsheet Programs
Financial companies, engineering firms and even scientists create increasingly larger spreadsheets and spreadsheet programs. The creators of large spreadsheets make errors and mus...
Tudor Antoniu, Paul A. Steckler, Shriram Krishnamu...
MOBIHOC
2008
ACM
15 years 9 months ago
Toward stochastic anatomy of inter-meeting time distribution under general mobility models
Recent discovery of the mixture (power-law and exponential) behavior of inter-meeting time distribution of mobile nodes presents new challenge to the problem of mobility modeling ...
Han Cai, Do Young Eun