Sciweavers

1413 search results - page 221 / 283
» Mining Multiple Large Databases
Sort
View
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
16 years 1 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
16 years 1 months ago
QURSED: querying and reporting semistructured data
QURSED enables the development of web-based query forms and reports (QFRs) that query and report semistructured XML data, i.e., data that are characterized by nesting, irregularit...
Yannis Papakonstantinou, Michalis Petropoulos, Vas...
SIGMOD
2001
ACM
145views Database» more  SIGMOD 2001»
16 years 1 months ago
Automatic Segmentation of Text into Structured Records
In this paper we present a method for automatically segmenting unformatted text records into structured elements. Several useful data sources today are human-generated as continuo...
Vinayak R. Borkar, Kaustubh Deshmukh, Sunita Saraw...
129
Voted
DEXA
2009
Springer
88views Database» more  DEXA 2009»
15 years 5 months ago
Significance-Based Failure and Interference Detection in Data Streams
Detecting the failure of a data stream is relatively easy when the stream is continually full of data. The transfer of large amounts of data allows for the simple detection of inte...
Nickolas J. G. Falkner, Quan Z. Sheng
CORR
2010
Springer
158views Education» more  CORR 2010»
15 years 1 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman