Sciweavers

1933 search results - page 267 / 387
» Query Containment Using Views
Sort
View
CIKM
2000
Springer
15 years 7 months ago
The Webspace Method: On the Integration of Database Technology with Multimedia Retrieval
Large collections of documents containing various types of multimedia, are made available to the WWW. Unfortunately, due to the un-structuredness of Internet environments it is ha...
Roelof van Zwol, Peter M. G. Apers
ACMSE
2009
ACM
15 years 9 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 8 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
IJOE
2011
118views more  IJOE 2011»
14 years 10 months ago
Three Online Neutron Beam Experiments Based on the iLab Shared Architecture
- Students at MIT have traditionally executed certain experiments in the containment building of the MIT nuclear reactor as part of courses in Nuclear Engineering and the third yea...
Kimberly DeLong, Judson V. Harward, Philip H. Bail...
PODS
2009
ACM
86views Database» more  PODS 2009»
16 years 3 months ago
Reverse data exchange: coping with nulls
An inverse of a schema mapping M is intended to "undo" what M does, thus providing a way to perform "reverse" data exchange. In recent years, three different f...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...