Sciweavers

2437 search results - page 430 / 488
» Performance Evaluation of Selected Job Management Systems
Sort
View
SIGMOD
2007
ACM
121views Database» more  SIGMOD 2007»
15 years 10 months ago
Execution strategies for SQL subqueries
Optimizing SQL subqueries has been an active area in database research and the database industry throughout the last decades. Previous work has already identified some approaches ...
César A. Galindo-Legaria, Milind Joshi, Mos...
USENIX
2007
15 years 2 days ago
MapJAX: Data Structure Abstractions for Asynchronous Web Applications
Data Structure Abstractions for Asynchronous Web Applications Daniel S. Myers MIT CSAIL Jennifer N. Carlisle MIT CSAIL James A. Cowling MIT CSAIL Barbara H. Liskov MIT CSAIL The c...
Daniel S. Myers, Jennifer N. Carlisle, James A. Co...
CLEF
2008
Springer
14 years 11 months ago
ParaMor and Morpho Challenge 2008
ParaMor, our unsupervised morphology induction system performed well at Morpho Challenge 2008. When ParaMor's morphological analyses, which specialize at identifying inflecti...
Christian Monson, Jaime G. Carbonell, Alon Lavie, ...
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
15 years 11 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...
ACSW
2006
14 years 11 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark