Sciweavers

1364 search results - page 152 / 273
» Data Level Inference Detection in Database Systems
Sort
View
80
Voted
IADIS
2003
15 years 2 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
SIGMOD
2010
ACM
144views Database» more  SIGMOD 2010»
15 years 5 months ago
Interactive visual exploration of neighbor-based patterns in data streams
We will demonstrate our system, called V iStream, supporting interactive visual exploration of neighbor-based patterns [7] in data streams. V istream does not only apply innovativ...
Di Yang, Zhenyu Guo, Zaixian Xie, Elke A. Rundenst...
132
Voted
DEXA
2004
Springer
190views Database» more  DEXA 2004»
15 years 6 months ago
On Efficient and Effective Association Rule Mining from XML Data
: In this paper, we propose a framework, called XAR-Miner, for mining ARs from XML documents efficiently and effectively. In XAR-Miner, raw XML data are first transformed to either...
Ji Zhang, Tok Wang Ling, Robert M. Bruckner, A. Mi...
ISCI
2011
14 years 7 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 3 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...