Sciweavers

8087 search results - page 203 / 1618
» Meta Data Management
Sort
View
141
Voted
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
118
Voted
DMKD
2004
ACM
115views Data Mining» more  DMKD 2004»
15 years 9 months ago
Privacy-preserving data integration and sharing
Integrating data from multiple sources has been a longstanding challenge in the database community. Techniques such as privacy-preserving data mining promises privacy, but assume ...
Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gun...
GLOBECOM
2008
IEEE
15 years 10 months ago
A Mobility Prediction-Based Adaptive Data Gathering Protocol for Delay Tolerant Mobile Sensor Network
— The basic operation of Delay Tolerant Mobile Sensor Network (DTMSN) is for pervasive data gathering in networks with intermittent connectivity, where traditional data gathering...
Jinqi Zhu, Jiannong Cao, Ming Liu, Yuan Zheng, Hai...
129
Voted
TIME
2006
IEEE
15 years 9 months ago
How Would You Like to Aggregate Your Temporal Data?
Published in: Proceedings of the 13th International Symposium on Temporal Representation and Reasoning (TIME-06), Budapest, Hungary, June 2006. IEEE Computer Society Press. Real-w...
Michael H. Böhlen, Johann Gamper, Christian S...
208
Voted
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
16 years 5 months ago
Automated Storage Management with QoS Guarantees
Automated storage management is critical for most dataintensive applications running on DBMSs. In large-scale storage subsystems, the workload is expected to vary with time. In or...
Lin Qiao, Balakrishna R. Iyer, Divyakant Agrawal, ...