Sciweavers

6667 search results - page 1261 / 1334
» Applications At Your Service
Sort
View
144
Voted
ACMSE
2008
ACM
15 years 1 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
ICDE
2008
IEEE
563views Database» more  ICDE 2008»
16 years 11 months ago
Probabilistic Verifiers: Evaluating Constrained Nearest-Neighbor Queries over Uncertain Data
In applications like location-based services, sensor monitoring and biological databases, the values of the database items are inherently uncertain in nature. An important query fo...
Reynold Cheng, Jinchuan Chen, Mohamed F. Mokbel, C...
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
16 years 1 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
ICDE
2009
IEEE
219views Database» more  ICDE 2009»
16 years 1 months ago
Distance Oracles for Spatial Networks
The popularity of location-based services and the need to do real-time processing on them has led to an interest in performing queries on transportation networks, such as finding s...
Jagan Sankaranarayanan, Hanan Samet
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 1 months ago
What's Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events....
Graham Cormode, S. Muthukrishnan, Wei Zhuang
« Prev « First page 1261 / 1334 Last » Next »