Sciweavers

40 search results - page 7 / 8
» Incorporating Active Rules Processing into Update Execution ...
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 9 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
SIGMOD
2008
ACM
193views Database» more  SIGMOD 2008»
14 years 5 months ago
Efficient provenance storage
Scientific workflow systems are increasingly used to automate complex data analyses, largely due to their benefits over traditional approaches for workflow design, optimization, a...
Adriane Chapman, H. V. Jagadish, Prakash Ramanan
DBISP2P
2004
Springer
111views Database» more  DBISP2P 2004»
13 years 10 months ago
Processing and Optimization of Complex Queries in Schema-Based P2P-Networks
Peer-to-Peer infrastructures are emerging as one of the important data management infrastructures in the World Wide Web. So far, however, most work has focused on simple P2P networ...
Hadhami Dhraief, Alfons Kemper, Wolfgang Nejdl, Ch...
EDBT
2010
ACM
164views Database» more  EDBT 2010»
13 years 8 months ago
Techniques for efficiently querying scientific workflow provenance graphs
A key advantage of scientific workflow systems over traditional scripting approaches is their ability to automatically record data and process dependencies introduced during workf...
Manish Kumar Anand, Shawn Bowers, Bertram Ludä...
VLDB
1992
ACM
105views Database» more  VLDB 1992»
13 years 9 months ago
Multiversion Query Locking
Multiversion two-phase locking (MV2PL) has been incorporated in some commercial transaction processing systems to support the serializable execution of queries. A drawback to this...
Paul M. Bober, Michael J. Carey