Sciweavers

1830 search results - page 228 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2005
IEEE
120views Database» more  ICDE 2005»
16 years 2 months ago
SNAP: Efficient Snapshots for Back-in-Time Execution
SNAP is a novel high-performance snapshot system for object storage systems. The goal is to provide a snapshot service that is efficient enough to permit "back-in-time" ...
Liuba Shrira, Hao Xu
SIGMOD
2006
ACM
150views Database» more  SIGMOD 2006»
16 years 1 months ago
On-the-fly sharing for streamed aggregation
Data streaming systems are becoming essential for monitoring applications such as financial analysis and network intrusion detection. These systems often have to process many simi...
Sailesh Krishnamurthy, Chung Wu, Michael J. Frankl...
EDBT
2004
ACM
94views Database» more  EDBT 2004»
16 years 1 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang
HPDC
2008
IEEE
15 years 7 months ago
Issues in applying data mining to grid job failure detection and diagnosis
As grid computation systems become larger and more complex, manually diagnosing failures in jobs becomes impractical. Recently, machine-learning techniques have been proposed to d...
Lakshmikant Shrinivas, Jeffrey F. Naughton
ICDE
2006
IEEE
132views Database» more  ICDE 2006»
15 years 7 months ago
Treatment of Rules in Individual Metadata of Flexible Contents Management
The properties of contents stored in a computer system are very wide while the data volume treated in the system becomes very large. It is important to treat each stored object in...
Kensuke Ohta, Dai Kobayashi, Takashi Kobayashi, Ry...