Sciweavers

2386 search results - page 343 / 478
» Database Security 2000
Sort
View
SIGMOD
2000
ACM
104views Database» more  SIGMOD 2000»
15 years 2 months ago
Spatial Join Selectivity Using Power Laws
We discovered a surprising law governing the spatial join selectivity across two sets of points. An example of such a spatial join is "find the libraries that are within 10 m...
Christos Faloutsos, Bernhard Seeger, Agma J. M. Tr...
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
15 years 11 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
86
Voted
WWW
2004
ACM
15 years 10 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
ESORICS
2009
Springer
15 years 4 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
JNSM
2008
130views more  JNSM 2008»
14 years 10 months ago
Declarative Infrastructure Configuration Synthesis and Debugging
There is a large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements. Today, this gap is manually br...
Sanjai Narain, Gary Levin, Sharad Malik, Vikram Ka...