Sciweavers

4113 search results - page 693 / 823
» Watermarking Relational Databases
Sort
View
144
Voted
WEBDB
2010
Springer
155views Database» more  WEBDB 2010»
15 years 8 months ago
Learning Topical Transition Probabilities in Click Through Data with Regression Models
The transition of search engine users’ intents has been studied for a long time. The knowledge of intent transition, once discovered, can yield a better understanding of how diď...
Xiao Zhang, Prasenjit Mitra
125
Voted
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
15 years 8 months ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
127
Voted
ICDM
2002
IEEE
108views Data Mining» more  ICDM 2002»
15 years 8 months ago
Mining Association Rules from Stars
Association rule mining is an important data mining problem. It is found to be useful for conventional relational data. However, previous work has mostly targeted on mining a sing...
Eric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang
124
Voted
ICSM
2002
IEEE
15 years 8 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
ISCA
2002
IEEE
127views Hardware» more  ISCA 2002»
15 years 8 months ago
The Optimum Pipeline Depth for a Microprocessor
The impact of pipeline length on the performance of a microprocessor is explored both theoretically and by simulation. An analytical theory is presented that shows two opposing ar...
Allan Hartstein, Thomas R. Puzak