Sciweavers

5344 search results - page 191 / 1069
» Privacy-Preserving Set Operations
Sort
View
201
Voted
ICDE
2006
IEEE
165views Database» more  ICDE 2006»
16 years 4 months ago
Efficient Continuous Skyline Computation
In a number of emerging streaming applications, the data values that are produced have an associated time interval for which they are valid. A useful computation over such streami...
Michael D. Morse, Jignesh M. Patel, William I. Gro...
ICDE
2003
IEEE
143views Database» more  ICDE 2003»
16 years 4 months ago
Index-Based Approximate XML Joins
XML data integration tools are facing a variety of challenges for their efficient and effective operation. Among these is the requirement to handle a variety of inconsistencies or...
Sudipto Guha, Nick Koudas, Divesh Srivastava, Ting...
141
Voted
PERCOM
2005
ACM
16 years 3 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
114
Voted
SOSP
2003
ACM
16 years 10 days ago
RacerX: effective, static detection of race conditions and deadlocks
This paper describes RacerX, a static tool that uses flowsensitive, interprocedural analysis to detect both race conditions and deadlocks. It is explicitly designed to find erro...
Dawson R. Engler, Ken Ashcraft
HICSS
2010
IEEE
159views Biometrics» more  HICSS 2010»
15 years 10 months ago
Towards a Systematic Approach for Capturing Dynamic Transformation in Enterprise Models
The transparency created by enterprise models is a valuable support for organizational engineering and especially enterprise transformation. However, current approaches are hardly...
Stephan Aier, Bettina Gleichauf