Sciweavers

1457 search results - page 185 / 292
» Privacy Challenges for Database Systems
Sort
View
138
Voted
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
15 years 10 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
CIDR
2009
119views Algorithms» more  CIDR 2009»
15 years 5 months ago
DBMSs Should Talk Back Too
Natural language user interfaces to database systems have been studied for several decades now. They have mainly focused on parsing and interpreting natural language queries to ge...
Alkis Simitsis, Yannis E. Ioannidis
ICDE
2008
IEEE
106views Database» more  ICDE 2008»
15 years 10 months ago
DIPBench: An independent benchmark for Data-Intensive Integration Processes
— The integration of heterogeneous data sources is one of the main challenges within the area of data engineering. Due to the absence of an independent and universal benchmark fo...
Matthias Böhm, Dirk Habich, Wolfgang Lehner, ...
167
Voted
DASFAA
2006
IEEE
220views Database» more  DASFAA 2006»
15 years 10 months ago
KEYNOTE: Keyword Search by Node Selection for Text Retrieval on DHT-Based P2P Networks
Efficient full-text keyword search remains a challenging problem in P2P systems. Most of the traditional keyword search systems on DHT overlay networks perform the join operation ...
Zheng Zhang, Shuigeng Zhou, Weining Qian, Aoying Z...
153
Voted
VLDB
2005
ACM
159views Database» more  VLDB 2005»
15 years 9 months ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu