Sciweavers

1863 search results - page 197 / 373
» Multi-valued Pattern Databases
Sort
View
210
Voted
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 3 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
16 years 2 months ago
COLT: continuous on-line tuning
Self-tuning is a cost-effective and elegant solution to the important problem of configuring a database to the characteristics of the query load. Existing techniques operate in an...
Karl Schnaitter, Serge Abiteboul, Tova Milo, Neokl...
GIS
2009
ACM
15 years 9 months ago
Proximate sensing using georeferenced community contributed photo collections
Volunteered geographic information such as that available in blogs, wikis, social networking sites, and community contributed photo collections is enabling new applications. This ...
Daniel Leung, Shawn Newsam
ISW
2004
Springer
15 years 7 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier
119
Voted
IPPS
2002
IEEE
15 years 7 months ago
Parallel Incremental 2D-Discretization on Dynamic Datasets
Most current work in data mining assumes that the database is static, and a database update requires rediscovering all the patterns by scanning the entire old and new database. Su...
Srinivasan Parthasarathy, Arun Ramakrishnan