Sciweavers

606 search results - page 88 / 122
» Memory-constrained aggregate computation over data streams
Sort
View
147
Voted
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 7 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
138
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
InterferenceRemoval: removing interference of disk access for MPI programs through data replication
As the number of I/O-intensive MPI programs becomes increasingly large, many efforts have been made to improve I/O performance, on both software and architecture sides. On the sof...
Xuechen Zhang, Song Jiang
121
Voted
DEBS
2007
ACM
15 years 7 months ago
Temporal order optimizations of incremental joins for composite event detection
Queries for composite events typically involve the four complementary dimensions of event data, event composition, relationships between events (esp. temporal and causal), and acc...
François Bry, Michael Eckert
135
Voted
CHI
1995
ACM
15 years 7 months ago
Pointing the Way: Active Collaborative Filtering
Collaborative filtering is based on the premise that people looking for information should be able to make use of what others have already found and evaluated. Current collaborati...
David Maltz, Kate Ehrlich
GCA
2008
15 years 4 months ago
Network-aware Peer-to-Peer Based Grid Inter-Domain Scheduling
Grid technologies have enabled the aggregation of geographically distributed resources, in the context of a particular application. The network remains an important requirement for...
Agustín C. Caminero, Omer F. Rana, Blanca C...