Sciweavers

845 search results - page 139 / 169
» Describing and Using Query Capabilities of Heterogeneous Sou...
Sort
View
GI
2009
Springer
14 years 11 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
131
Voted
JACM
2010
120views more  JACM 2010»
14 years 8 months ago
The structure of inverses in schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Alan Nash
PODS
2008
ACM
155views Database» more  PODS 2008»
16 years 1 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
212
Voted
ICDE
2008
IEEE
209views Database» more  ICDE 2008»
16 years 3 months ago
Distributed Monitoring of Peer-to-Peer Systems
In this paper, we are concerned with the distributed monitoring of P2P systems. We introduce the P2P Monitor system and a new declarative language, namely P2PML, for specifying mo...
Serge Abiteboul, Bogdan Marinoiu, Pierre Bourhis
CIKM
2001
Springer
15 years 6 months ago
Approaches to Collection Selection and Results Merging for Distributed Information Retrieval
We have investigated two major issues in Distributed Information Retrieval (DIR), namely: collection selection and search results merging. While most published works on these two ...
Yves Rasolofo, Faiza Abbaci, Jacques Savoy