Sciweavers

8655 search results - page 1268 / 1731
» Challenges for Trusted Computing
Sort
View
POPL
2005
ACM
16 years 4 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
241
Voted
VLDB
2007
ACM
179views Database» more  VLDB 2007»
16 years 4 months ago
Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data
Market analysis is a representative data analysis process with many applications. In such an analysis, critical numerical measures, such as profit and sales, fluctuate over time a...
Xiaolei Li, Jiawei Han
225
Voted
VLDB
2007
ACM
130views Database» more  VLDB 2007»
16 years 4 months ago
A Simple and Efficient Estimation Method for Stream Expression Cardinalities
Estimating the cardinality (i.e. number of distinct elements) of an arbitrary set expression defined over multiple distributed streams is one of the most fundamental queries of in...
Aiyou Chen, Jin Cao, Tian Bu
228
Voted
SIGMOD
2005
ACM
157views Database» more  SIGMOD 2005»
16 years 4 months ago
Meta-data version and configuration management in multi-vendor environments
Nearly all components that comprise modern information technology, such as Computer Aided Software Engineering (CASE) tools, Enterprise Application Integration (EAI) environments,...
John R. Friedrich
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
16 years 4 months ago
UbiData: Requirements and Architecture for Ubiquitous Data Access
Mobile users today demand ubiquitous access to their data from any mobile device and under variable connection quality. We refer to this requirement as any-time, any-where data ac...
Abdelsalam Helal, Joachim Hammer
« Prev « First page 1268 / 1731 Last » Next »