Sciweavers

RTCSA
1999
IEEE
13 years 8 months ago
Adaptive Data Broadcast Strategy for Transactions with Multiple Data Requests in Mobile Computing Environments
Data Broadcast in mobile environments has received much attention in recent years and a large number of algorithms proposed. However, existing work in the literature only assume a ...
Joe Chun-Hung Yuen, Edward Chan, Kam-yiu Lam
ECOOP
1999
Springer
13 years 8 months ago
An Approach to Classify Semi-structured Objects
Several advanced applications, such as those dealing with the Web, need to handle data whose structure is not known a-priori. Such requirement severely limits the applicability of ...
Elisa Bertino, Giovanna Guerrini, Isabella Merlo, ...
ASYNC
1999
IEEE
136views Hardware» more  ASYNC 1999»
13 years 8 months ago
A Counterflow Pipeline Experiment
The counterflow pipeline architecture [12] consists of two interacting pipelines in which data items flow in opposite directions. Interactions occur between two items when they me...
Bill Coates, Jo C. Ebergen, Jon K. Lexau, Scott Fa...
ACSAC
1999
IEEE
13 years 9 months ago
Application-Level Isolation Using Data Inconsistency Detection
Recently, application-level isolation was introduced as an effective means of containing the damage that a suspicious user could inflict on data. In most cases, only a subset of t...
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
ICDE
2000
IEEE
144views Database» more  ICDE 2000»
13 years 9 months ago
Practical Lineage Tracing in Data Warehouses
We consider the view data lineage problem in a warehousing environment: For a given data item in a materialized warehouse view, we want to identify the set of source data items th...
Yingwei Cui, Jennifer Widom
ICDCS
2000
IEEE
13 years 9 months ago
Scheduling Heuristics for Data Requests in an Oversubscribed Network with Priorities and Deadlines
Providing up-to-date input to users’ applications is an important data management problem for a distributed computing environment, where each data storage location and intermedi...
Mitchell D. Theys, Noah Beck, Howard Jay Siegel, M...
VLDB
2001
ACM
119views Database» more  VLDB 2001»
13 years 9 months ago
A Prototype Content-Based Retrieval System that Uses Virtual Images to Save Space
Previous research has demonstrated that space can be saved in a MultiMedia DataBase Management System (MMDBMS) by storing some of the data items virtually, meaning they are stored...
Leonard Brown, Le Gruenwald
DEXAW
2002
IEEE
127views Database» more  DEXAW 2002»
13 years 9 months ago
Enhanced Multi-Version Data Broadcast Schemes for Time-Constrained Mobile Computing Systems
In this paper, we study the data dissemination problem in time-constrained mobile computing systems (TCMCS) in which maximizing data currency (minimizing staleness) and meeting tr...
Hei-Wing Leung, Joe Chun-Hung Yuen, Kam-yiu Lam, E...
NSPW
2003
ACM
13 years 9 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CCGRID
2003
IEEE
13 years 9 months ago
Peer-to-Peer Keyword Search Using Keyword Relationship
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for Internet-scale information retrieval and search systems because they require neither...
Kiyohide Nakauchi, Yuichi Ishikawa, Hiroyuki Morik...