Sciweavers

54 search results - page 4 / 11
» A Holistic Approach for Managing Spyware
Sort
View
108
Voted
CIKM
2004
Springer
15 years 1 months ago
Efficient processing of XML twig patterns with parent child edges: a look-ahead approach
With the growing importance of semi-structure data in information exchange, much research has been done to provide an effective mechanism to match a twig query in an XML database....
Jiaheng Lu, Ting Chen, Tok Wang Ling
WWW
2005
ACM
15 years 10 months ago
Answering order-based queries over XML data
Order-based queries over XML data include XPath navigation axes such as following-sibling and following. In this paper, we present holistic algorithms that evaluate such order-bas...
Zografoula Vagena, Nick Koudas, Divesh Srivastava,...
EMISA
2005
Springer
15 years 3 months ago
A Comprehensive Enterprise Architecture Metamodel
Abstract Due to the growing importance of alignment, compliance and manageability issues, increased attention is being paid to architectures and architecture management recently. A...
Christian Braun, Robert Winter
EDBT
2012
ACM
395views Database» more  EDBT 2012»
12 years 12 months ago
Data management with SAPs in-memory computing engine
We present some architectural and technological insights on SAP’s HANA database and derive research challenges for future enterprise application development. The HANA database m...
Joos-Hendrik Boese, Cafer Tosun, Christian Mathis,...
ACSAC
2005
IEEE
15 years 3 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth