Sciweavers

912 search results - page 127 / 183
» Optimizing Timestamp Management in Data Stream Management Sy...
Sort
View
148
Voted
PVLDB
2008
132views more  PVLDB 2008»
15 years 2 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne
IJVR
2006
166views more  IJVR 2006»
15 years 3 months ago
Multi-screen Tiled Displayed, Parallel Rendering System for a Large Terrain Dataset
Real time terrain rendering plays a very important role in many fields, such of GIS, virtual reality, and military simulations. With the rapid development of PC-level hardware, rec...
Ping Yin, Xiaohong Jiang, Jiaoying Shi, Ran Zhou
113
Voted
LREC
2008
88views Education» more  LREC 2008»
15 years 4 months ago
An Infrastructure, Tools and Methodology for Evaluation of Multicultural Name Matching Systems
This paper describes a Name Matching Evaluation Laboratory that is a joint effort across multiple projects. The lab houses our evaluation infrastructure as well as multiple name m...
Keith J. Miller, Mark Arehart, Catherine Ball, Joh...
160
Voted
PODS
2008
ACM
152views Database» more  PODS 2008»
16 years 3 months ago
Towards a theory of schema-mapping optimization
A schema mapping is a high-level specification that describes the relationship between two database schemas. As schema mappings constitute the essential building blocks of data ex...
Ronald Fagin, Phokion G. Kolaitis, Alan Nash, Luci...
131
Voted
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 9 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo