106 Hits in 3.2 sec

Introduction to the EDBT 2006 special section

Yannis Ioannidis
2007 ACM Transactions on Database Systems  
Introduction to the EDBT 2006 Special Section This issue contains three substantially expanded versions of papers that were presented at the 10th International Conference on Extending Database Technology  ...  EDBT 2006.  ... 
doi:10.1145/1292609.1292617 fatcat:3hcq32zzcndkbdcds3jacwgodi

Guest Editors' Introduction: Special Section on Mining Large Uncertain and Probabilistic Databases

Reynold Cheng, Michael Chau, Minos Garofalakis, Jeffrey Xu Yu
2010 IEEE Transactions on Knowledge and Data Engineering  
We also like to thank Drs. Xindong Wu and Beng-Chin Ooi, the former and current Editor-in-Chief of TKDE, for giving us the opportunity to publish this special section. (2004) (2005) (2006) .  ...  In closing, we would like to thank the authors for their high-quality contributions to this special section and the referees for their generous help and valuable suggestions.  ... 
doi:10.1109/tkde.2010.118 fatcat:rvbi4kyomzct5emubn2ycos5ji


Rene Mueller, Jens Teubner
2010 Proceedings of the 13th International Conference on Extending Database Technology - EDBT '10  
In line with the insight that "one size" of databases will not fit all application needs [19] , the database community is currently exploring various alternatives to commodity, CPUbased system designs.  ...  The goal of this tutorial is to develop an intuition of an FPGA development cycle, receive guidelines for a "good" FPGA design, but also learn the limitations that hardware-implemented database processing  ...  To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. EDBT 2010, March 22-26, 2010, Lausanne, Switzerland.  ... 
doi:10.1145/1739041.1739137 dblp:conf/edbt/MullerT10 fatcat:i5moqwftu5acri624w52jmooiy

An Extensible, Distributed Simulation Environment for Peer Data Management Systems [chapter]

Katja Hose, Andreas Job, Marcel Karnstedt, Kai-Uwe Sattler
2006 Lecture Notes in Computer Science  
In the demonstration we plan to show the evaluation of processing strategies for queries with specialized operators like top-k and skyline computation on structured data.  ...  One of the main challenges of this paradigm is the development and evaluation of indexing and query processing strategies for large-scale networks.  ...  .): EDBT 2006, LNCS 3896, pp. 1198-1202, 2006. c Springer-Verlag Berlin Heidelberg 2006  ... 
doi:10.1007/11687238_91 fatcat:5vs5nmjdcza6bj67ta3lmpvhw4

Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy

Elena Ferrari, Bhavani Thuraisingham
2012 IEEE Transactions on Dependable and Secure Computing  
We hope that this special issue will spawn new ideas, concepts and solutions for next generation DASPY systems. We would like to dedicate this special issue to the late Dr.  ...  Very Large Data Bases, special issue on privacy preserving data management, E. Ferrari and B. Thuraisingham eds., vol. 15, no. 4, pp. 23-33, 2006. [1] B.  ... 
doi:10.1109/tdsc.2012.58 fatcat:pmwlo2pfd5cede3nwi6urm2bym

Impact of Government Expenditure on Economic Growth In Sub-Saharan Africa: A Validity of Wagner's Law

Funsho Kolapo, Azeez Bolanle, Joseph Mokuolu, Taiwo Oluwaleye, Kehinde Alabi
2021 International Journal of Scientific Research and Management  
The study investigated the impact of government expenditure on economic growth with special inclination to testing the Wagner's law in Sub Saharan Africa between 1986 and 2018.  ...  Therefore, based on the negativity of capital and recurrent expenditure, it is recommended that capital and recurrent expenditure must be monitored effectively to ensure that its increase will not exert  ...  Acknowledgements The authors gratefully acknowledge the support of Aluko Olufemi Adewale for his comments and suggestions.  ... 
doi:10.18535/ijsrm/v9i2.em01 fatcat:caar3z7ph5dfhgkvvbtxa3dznm

Using non-preemptive regions and path modification to improve schedulability of real-time traffic over priority-based NoCs

Meng Liu, Matthias Becker, Moris Behnam, Thomas Nolte
2017 Real-time systems  
A number of experiments have been performed to evaluate the proposed solutions, where we can observe significant improvement on schedulability compared to the original flit-level preemptive NoCs.  ...  Fixed-priority based scheduling using virtual-channels is one of the promising solutions to support real-time traffic in on-chip networks.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s11241-017-9276-5 fatcat:6zwuyknjqbbd3gktopxjsj2qhu

Investigation of Topic Trends in Computer and Information Science by Text Mining Techniques: From the Perspective of Conferences in DBLP
텍스트 마이닝 기법을 이용한 컴퓨터공학 및 정보학 분야 연구동향 조사: DBLP의 학술회의 데이터를 중심으로

Su Yeon Kim, Sung Jeon Song, Min Song
2015 Journal of the Korean Society for information Management  
The goal of this paper is to explore the field of Computer and Information Science with the aid of text mining techniques by mining Computer and Information Science related conference data available in  ...  We aim to include conferences in the field of Computer and Information Science as broad as possible.  ...  However, in case of specialization of a topic, we need to analyze the topic over time to see if key terms in the topic become more similar with terms in other topics.  ... 
doi:10.3743/kosim.2015.32.1.135 fatcat:mfkvkxqf6nhpjkqngswkaetugq

Detecting Communities of Authority and Analyzing Their Influence in Dynamic Social Networks

Belkacem Chikhaoui, Mauricio Chiazzaro, Shengrui Wang, Martin Sotir
2017 ACM Transactions on Intelligent Systems and Technology  
To assess the influence between communities over time, we propose a new model based on the Granger causality method.  ...  Then, communities of authority are extracted with respect to each meta-community, using a new measure based on the betweenness centrality.  ...  Hierarchical Dirichlet Process (HDP) method [Teh et al. 2006 ] could possibly be used in this context to determine the number of meta-communities.  ... 
doi:10.1145/3070658 fatcat:psj7a4ev4jdg7m7h26xdcbryxy

Trustworthy vacuuming and litigation holds in long-term high-integrity records retention

Ragib Hasan, Marianne Winslett
2010 Proceedings of the 13th International Conference on Extending Database Technology - EDBT '10  
The requested information is then subject to a litigation hold, which means that the information cannot be deleted.  ...  Relational databases are periodically vacuumed to remove tuples that have expired. During the discovery phase of litigation, plaintiffs ask defendants for access to information related to their case.  ...  This work was supported by NSF under the grants CNS-0716532, IIS-0803280, and CCF-0938071.  ... 
doi:10.1145/1739041.1739115 dblp:conf/edbt/HasanW10 fatcat:boh4sfv4njeolenklsnvh32fey

Middleware solutions for integrated simulation environments

Leila Jalali, Sharad Mehrotra, Nalini Venkatasubramanian
2010 Proceedings of the 7th Middleware Doctoral Symposium on - MDS '10  
translators to transform the data between different simulators, Verlag Berlin Heidelberg, 627-637 (2006) (ii) the time synchronizer to synchronize the time between [6] Rhalibi, A.E., Merabti  ...  Soc. 51(4), 423–430 (2000) [26] Kuhl, F., Weatherly, R., Dahmann, J.: Creating Computer Simulation Systems: An Introduction to the High Level Architecture, New Jersey, Prentice Hall (1999  ... 
doi:10.1145/1891748.1891749 fatcat:dduyalfd2bg7dltf4vilrbz7p4

BRR: Preserving Privacy of Text Data Efficiently on Device [article]

Ricardo Silva Carvalho, Theodore Vasiloudis, Oluwaseyi Feyisetan
2021 arXiv   pre-print
With the use of personal devices connected to the Internet for tasks such as searches and shopping becoming ubiquitous, ensuring the privacy of the users of such services has become a requirement in order  ...  With our solution, sensitive data never leaves the device and service providers only have access to privatized data to train models on and analyze.  ...  The best way to ensure that is by sending no sensitive data to the service provider at all, known as the zero-trust model (Dwork et al., 2006) .  ... 
arXiv:2107.07923v1 fatcat:kgnpj6m2zvflrlknwtmvdlbaxi

A novel approach of mining write-prints for authorship attribution in e-mail forensics

Farkhund Iqbal, Rachid Hadjidj, Benjamin C.M. Fung, Mourad Debbabi
2008 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
This notion is called frequent pattern, which has proven to be effective in many data mining applications, but it is the first time to be applied to the problem of authorship attribution.  ...  The problem of e-mail authorship attribution is to identify the most plausible author of an anonymous e-mail from a group of potential suspects.  ...  Acknowledgments The research is supported in part by the Discovery Grants (356065-2008) from the Natural Sciences and Engineering Research Council of Canada (NSERC), and the Faculty Start-up Funds from  ... 
doi:10.1016/j.diin.2008.05.001 fatcat:qshsde2wevez3mzcemt7dok4iy

From Sets of Good Redescriptions to Good Sets of Redescriptions

Janis Kalofolias, Esther Galbrun, Pauli Miettinen
2016 2016 IEEE 16th International Conference on Data Mining (ICDM)  
In this work, we present an approach to identify and remove the redundant redescriptions, that is, an approach to move from a set of good redescriptions to a good set of redescriptions.  ...  Such an approach can result in many redundant redescriptions and hinder the user's ability to understand the overall characteristics of the data.  ...  The MTV model corresponds to a special case of our row model (see Section 3.1) for non-certain validities.  ... 
doi:10.1109/icdm.2016.0032 dblp:conf/icdm/KalofoliasGM16 fatcat:tbsngvyrgzc4nozeb4pqvqc4am

Caching query-biased snippets for efficient retrieval

Diego Ceccarelli, Claudio Lucchese, Salvatore Orlando, Raffaele Perego, Fabrizio Silvestri
2011 Proceedings of the 14th International Conference on Extending Database Technology - EDBT/ICDT '11  
Snippets, i.e. short sentences showing the portions of the document being relevant to the query, help users to select the most interesting results.  ...  Web Search Engines' result pages contain references to the top-k documents relevant for the query submitted by a user. Each document is represented by a title, a snippet and a URL.  ...  Acknowledgements This work was supported by the EU-FP7-250527 (Assets) project.  ... 
doi:10.1145/1951365.1951379 dblp:conf/edbt/CeccarelliLOPS11 fatcat:y7ohxmmr7zdatmogaiwmiuniza
« Previous Showing results 1 — 15 out of 106 results