Sciweavers

1886 search results - page 285 / 378
» Evaluation of Object-Oriented Database Systems
Sort
View
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
16 years 1 months ago
Query Planning with Limited Source Capabilities
In information-integration systems, sources may have diverse and limited query capabilities. In this paper we show that because sources have restrictions on retrieving their infor...
Chen Li, Edward Y. Chang
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 8 days ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
179
Voted
VLDB
2007
ACM
161views Database» more  VLDB 2007»
16 years 3 days ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
VLDB
2009
ACM
208views Database» more  VLDB 2009»
16 years 3 days ago
A distributed spatial index for error-prone wireless data broadcast
Information is valuable to users when it is available not only at the right time but also at the right place. To support efficient location-based data access in wireless data broad...
Baihua Zheng, Wang-Chien Lee, Ken C. K. Lee, Dik L...
SIGMOD
2007
ACM
105views Database» more  SIGMOD 2007»
16 years 18 hour ago
Supporting entity search: a large-scale prototype search engine
As the Web has evolved into a data-rich repository, with the standard "page view," current search engines are increasingly inadequate. While we often search for various ...
Tao Cheng, Xifeng Yan, Kevin Chen-Chuan Chang