Sciweavers

10435 search results - page 1995 / 2087
» Measuring system normality
Sort
View
116
Voted
EDBT
2008
ACM
137views Database» more  EDBT 2008»
16 years 25 days ago
Synthesizing structured text from logical database subsets
In the classical database world, information access has been based on a paradigm that involves structured, schema-aware, queries and tabular answers. In the current environment, h...
Alkis Simitsis, Georgia Koutrika, Yannis Alexandra...
86
Voted
EDBT
2008
ACM
118views Database» more  EDBT 2008»
16 years 25 days ago
Robustness in automatic physical database design
Automatic physical database design tools rely on "what-if" interfaces to the query optimizer to estimate the execution time of the training query workload under differen...
Kareem El Gebaly, Ashraf Aboulnaga
101
Voted
ICSE
2007
IEEE-ACM
16 years 24 days ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
101
Voted
ICSE
2008
IEEE-ACM
16 years 24 days ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
117
Voted
MOBISYS
2006
ACM
16 years 9 days ago
Feasibility study of mesh networks for all-wireless offices
There is a fair amount of evidence that mesh (static multihop wireless) networks are gaining popularity, both in the academic literature and in the commercial space. Nonetheless, ...
Jakob Eriksson, Sharad Agarwal, Paramvir Bahl, Jit...
« Prev « First page 1995 / 2087 Last » Next »