Sciweavers

3651 search results - page 567 / 731
» Data Mining for Security Applications
Sort
View
SAC
1997
ACM
15 years 9 months ago
The RasDaMan approach to multidimensional database management
Multidimensional discrete data (MDD), i.e., arrays of arbitrary size, dimension, and base type, are receiving growing attention among the database community. MDD occur in a variet...
Peter Baumann, Paula Furtado, Roland Ritsch, Norbe...
ASPLOS
2006
ACM
15 years 9 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
WWW
2004
ACM
16 years 5 months ago
Affinity rank: a new scheme for efficient web search
Maximizing only the relevance between queries and documents will not satisfy users if they want the top search results to present a wide coverage of topics by a few representative...
Yi Liu, Benyu Zhang, Zheng Chen, Michael R. Lyu, W...
SIGMOD
2004
ACM
166views Database» more  SIGMOD 2004»
16 years 5 months ago
Fast Computation of Database Operations using Graphics Processors
We present new algorithms on commodity graphics processors to perform fast computation of several common database operations. Specifically, we consider operations such as conjunct...
Naga K. Govindaraju, Brandon Lloyd, Wei Wang 0010,...
SSDBM
2009
IEEE
77views Database» more  SSDBM 2009»
15 years 12 months ago
Query Recommendations for Interactive Database Exploration
Abstract. Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenar...
Gloria Chatzopoulou, Magdalini Eirinaki, Neoklis P...