Sciweavers

481 search results - page 65 / 97
» An Approach to Behavior Sharing in Federated Database System...
Sort
View
175
Voted
ICDE
2006
IEEE
114views Database» more  ICDE 2006»
16 years 1 months ago
Experiment Management with Metadata-based Integration for Collaborative Scientific Research
Scientific research is becoming increasingly relied on collaborative effort among multiple institutions and interdisciplinary consortium, through sharing experiments and data, and...
Fusheng Wang, Peiya Liu, John Pearson, Fred Azar, ...
IDEAS
2009
IEEE
111views Database» more  IDEAS 2009»
15 years 6 months ago
Semantics of a runtime adaptable transaction manager
Database Management Systems (DBMSs) that can be tailored to specific requirements offer the potential to improve reliability and maintainability and simultaneously the ability t...
Florian Irmert, Frank Lauterwald, Christoph P. Neu...
ISI
2004
Springer
15 years 5 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 2 days ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
AAAI
2012
13 years 2 months ago
Strategic Advice Provision in Repeated Human-Agent Interactions
This paper addresses the problem of automated advice provision in settings that involve repeated interactions between people and computer agents. This problem arises in many real ...
Amos Azaria, Zinovi Rabinovich, Sarit Kraus, Claud...