Sciweavers

5312 search results - page 960 / 1063
» Business Process Management Systems
Sort
View
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 4 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
16 years 4 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
PODS
2008
ACM
123views Database» more  PODS 2008»
16 years 4 months ago
Evaluating rank joins with optimal cost
In the rank join problem, we are given a set of relations and a scoring function, and the goal is to return the join results with the top K scores. It is often the case in practic...
Karl Schnaitter, Neoklis Polyzotis
MOBIHOC
2007
ACM
16 years 3 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
ICCD
2004
IEEE
107views Hardware» more  ICCD 2004»
16 years 1 months ago
Network-on-Chip: The Intelligence is in The Wire
In this paper we describe how Network-on-Chip (NoC) will be the next major challenge to implementing complex and function-rich applications in advanced manufacturing processes at ...
Gérard Mas, Philippe Martin