Sciweavers

794 search results - page 145 / 159
» Physical network models and multi-source data integration
Sort
View
CCS
2008
ACM
14 years 11 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
ACSAC
2003
IEEE
15 years 1 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
ICDE
1997
IEEE
92views Database» more  ICDE 1997»
15 years 11 months ago
Distributing Semantic Constraints Between Heterogeneous Databases
In recent years, research about distributing databases over networks has become increasingly important. Here we concentrate on the issues of interoperability of heterogeneous DBMS...
Stefan Grufman, Fredrik Samson, Suzanne M. Embury,...
IDA
2011
Springer
14 years 4 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May
PERCOM
2007
ACM
15 years 9 months ago
Achieving Flexible Cache Consistency for Pervasive Internet Access
Caching is an important technique to support pervasive Internet access. Cache consistency measures the deviation between the cached data and the source data. In mobile computing e...
Yu Huang 0002, Jiannong Cao, Zhijun Wang, Beihong ...