Sciweavers

740 search results - page 74 / 148
» Improving data quality through effective use of data semanti...
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
PVLDB
2008
136views more  PVLDB 2008»
15 years 3 months ago
Keyword query cleaning
Unlike traditional database queries, keyword queries do not adhere to predefined syntax and are often dirty with irrelevant words from natural languages. This makes accurate and e...
Ken Q. Pu, Xiaohui Yu
ICDE
2003
IEEE
143views Database» more  ICDE 2003»
16 years 5 months ago
Index-Based Approximate XML Joins
XML data integration tools are facing a variety of challenges for their efficient and effective operation. Among these is the requirement to handle a variety of inconsistencies or...
Sudipto Guha, Nick Koudas, Divesh Srivastava, Ting...
CORR
2010
Springer
342views Education» more  CORR 2010»
15 years 4 months ago
A Wireless Sensor Network Air Pollution Monitoring System
Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for...
Kavi Kumar Khedo, Rajiv Perseedoss, Avinash Mungur
ICSE
2009
IEEE-ACM
15 years 11 months ago
Automated substring hole analysis
Code coverage is a common measure for quantitatively assessing the quality of software testing. Code coverage indicates the fraction of code that is actually executed by tests in ...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...