31 |
|
Finding Top-k Answers in Keyword Search over Relational Databases Using Tuple Units:
|
Feng, J,Li, G,Wang, J
|
IEEE Computer Society
|
2011
|
|
|
32 |
|
Efficient Keyword-Based Search for Top-K Cells in Text Cube:
|
Ding, B,Zhao, B,Lin, C X,Han, J,Zhai, C,Srivastava, A,Oza, N C
|
IEEE Computer Society
|
2011
|
|
|
33 |
|
Data Leakage Detection:
|
Papadimitriou, P,Garcia-Molina, H
|
IEEE Computer Society
|
2011
|
|
|
34 |
|
Decision Trees for Uncertain Data:
|
Tsang, S,Kao, B,Yip, K Y,Ho, W-S,Lee, S D
|
IEEE Computer Society
|
2011
|
|
|
35 |
|
Inconsistency-Tolerant Integrity Checking:
|
Decker, H,Martinenghi, D
|
IEEE Computer Society
|
2011
|
|
|
36 |
|
Initialization and Restart in Stochastic Local Search: Computing a Most Probable Explanation in Bayesian Networks:
|
Mengshoel, O J,Wilkins, D C,Roth, D
|
IEEE Computer Society
|
2011
|
|
|
37 |
|
Effective Navigation of Query Results Based on Concept Hierarchies:
|
Kashyap, A,Hristidis, V,Petropoulos, M,Tavoulari, S
|
IEEE Computer Society
|
2011
|
|
|
38 |
|
Estimating and Enhancing Real-Time Data Service Delays: Control-Theoretic Approaches:
|
Kang, K-D,Zhou, Y,Oh, J
|
IEEE Computer Society
|
2011
|
|
|
39 |
|
Intertemporal Discount Factors as a Measure of Trustworthiness in Electronic Commerce:
|
Hazard, C J,Singh, M P
|
IEEE Computer Society
|
2011
|
|
|
40 |
|
Mining Discriminative Patterns for Classifying Trajectories on Road Networks:
|
Lee, J-G,Han, J,Li, X,Cheng, H
|
IEEE Computer Society
|
2011
|
|
|