Sciweavers

5344 search results - page 291 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICDE
2007
IEEE
173views Database» more  ICDE 2007»
16 years 5 months ago
Adaptive Load Diffusion for Multiway Windowed Stream Joins
In this paper, we present an adaptive load diffusion operator to enable scalable processing of Multiway Windowed Stream Joins (MWSJs) using a cluster system. The load diffusion is...
Xiaohui Gu, Philip S. Yu, Haixun Wang
ICDE
1999
IEEE
109views Database» more  ICDE 1999»
16 years 5 months ago
On the Semantics of Complex Events in Active Database Management Systems
Active database management systems have been developed for applications needing an automatic reaction in response to certain events. Events can be simple in nature or complex. Com...
Detlef Zimmer, Rainer Unland
138
Voted
DAC
2009
ACM
16 years 5 months ago
A DVS-based pipelined reconfigurable instruction memory
Energy consumption is of significant concern in battery operated embedded systems. In the processors of such systems, the instruction cache consumes a significant fraction of the ...
Zhiguo Ge, Tulika Mitra, Weng-Fai Wong
ICML
2005
IEEE
16 years 5 months ago
Online feature selection for pixel classification
Online feature selection (OFS) provides an efficient way to sort through a large space of features, particularly in a scenario where the feature space is large and features take a...
Karen A. Glocer, Damian Eads, James Theiler
ESORICS
2009
Springer
16 years 4 months ago
Data Structures with Unpredictable Timing
Abstract. A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an ...
Darrell Bethea, Michael K. Reiter