Sciweavers

495 search results - page 62 / 99
» Turning Cluster Management into Data Management: A System Ov...
Sort
View
SISW
2005
IEEE
15 years 7 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
DAWAK
2000
Springer
15 years 5 months ago
Enhancing Preprocessing in Data-Intensive Domains using Online-Analytical Processing
Abstract The application of data mining algorithms needs a goal-oriented preprocessing of the data. In practical applications the preprocessing task is very time consuming and has ...
Alexander Maedche, Andreas Hotho, Markus Wiese
MTSR
2007
Springer
15 years 7 months ago
Creating and Querying an Integrated Ontology for Molecular and Phenotypic Cereals Data
In this paper we describe the development of an ontology of molecular and phenotypic cereals data, realized by integrating existing public web databases with the database developed...
Sonia Bergamaschi, Antonio Sala 0002
CIKM
2009
Springer
15 years 8 months ago
Towards non-directional Xpath evaluation in a RDBMS
XML query languages use directional path expressions to locate data in an XML data collection. They are tightly coupled to the structure of a data collection, and can fail when ev...
Sourav S. Bhowmick, Curtis E. Dyreson, Erwin Leona...
WILF
2009
Springer
487views Fuzzy Logic» more  WILF 2009»
16 years 10 days ago
A combined Fuzzy and Probabilistic data descriptor for distributed CBIR
With the wide diffusion of digital image acquisition devices, the cost of managing hundreds of digital images is quickly increasing. Currently, the main way to search digital ima...
Marco La Cascia, Marco Morana, Roberto Gallea