Sciweavers

6059 search results - page 1165 / 1212
» A Technique for Verifying Measurements
Sort
View
VLDB
2000
ACM
120views Database» more  VLDB 2000»
15 years 3 months ago
Integrating the UB-Tree into a Database System Kernel
Multidimensional access methods have shown high potential for significant performance improvements in various application domains. However, only few approaches have made their way...
Frank Ramsak, Volker Markl, Robert Fenk, Martin Zi...
BTW
2009
Springer
168views Database» more  BTW 2009»
15 years 3 months ago
Embedded Analytics in Front Office Applications
: Today, decision making by users of front office applications happens without analytical information supporting this process. We propose as solution Embedded Analytics (EA) making...
Martin Oberhofer, Erik Nijkamp
DEBS
2010
ACM
15 years 3 months ago
Workload characterization for operator-based distributed stream processing applications
Operator-based programming languages provide an effective development model for large scale stream processing applications. A stream processing application consists of many runtim...
Xiaolan J. Zhang, Sujay Parekh, Bugra Gedik, Henri...
NSDI
2008
15 years 2 months ago
Phalanx: Withstanding Multimillion-Node Botnets
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality on the Internet. They are simple to execute and with the growing prevalence and size of...
Colin Dixon, Thomas E. Anderson, Arvind Krishnamur...
USS
2008
15 years 2 months ago
The Practical Subtleties of Biometric Key Generation
The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been s...
Lucas Ballard, Seny Kamara, Michael K. Reiter
« Prev « First page 1165 / 1212 Last » Next »