Sciweavers

3276 search results - page 340 / 656
» Data Management for Pervasive Computing
Sort
View
ESCIENCE
2005
IEEE
15 years 9 months ago
The SegHidro Experience: Using the Grid to Empower a Hydro-Meteorological Scientific Network
This paper describes our experience with SegHidro, a project that empowers hydro-meteorological researchers by (i) enabling collaborative work via the coupling of computer models,...
Eliane Araújo, Walfredo Cirne, Gustavo Wagn...
EDBT
2009
ACM
135views Database» more  EDBT 2009»
15 years 8 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
113
Voted
DSN
2005
IEEE
15 years 9 months ago
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 4 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
SACMAT
2009
ACM
15 years 10 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...