Sciweavers

2309 search results - page 392 / 462
» Patterns for Technology Companies
Sort
View
ICDIM
2007
IEEE
15 years 1 months ago
Efficient XML storage based on DTM for read-oriented workloads
We propose an XML storage scheme based on Document Table Model (DTM) which expresses an XML document as a table form. When performing query processing on large scale XML data, XML...
Makoto Yui, Jun Miyazaki, Shunsuke Uemura, Hirokaz...
CAMAD
2006
IEEE
15 years 1 months ago
On the exploitation of user aggregation strategies in heterogeneous wireless networks
Abstract-- In this paper we discuss the exploitation of aggregated mobility patterns and physical proximity of nodes in a so-called ambient network, i.e., a wireless network with h...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
DSN
2004
IEEE
15 years 1 months ago
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are bei...
Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Si...
CIKM
2006
Springer
15 years 1 months ago
Incremental hierarchical clustering of text documents
Incremental hierarchical text document clustering algorithms are important in organizing documents generated from streaming on-line sources, such as, Newswire and Blogs. However, ...
Nachiketa Sahoo, Jamie Callan, Ramayya Krishnan, G...
CIKM
2006
Springer
15 years 1 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios