Sciweavers

633 search results - page 115 / 127
» Routing of structured queries in large-scale distributed sys...
Sort
View
SIGMOD
2009
ACM
167views Database» more  SIGMOD 2009»
15 years 10 months ago
HDSampler: revealing data behind web form interfaces
A large number of online databases are hidden behind the web. Users to these systems can form queries through web forms to retrieve a small sample of the database. Sampling such h...
Anirban Maiti, Arjun Dasgupta, Nan Zhang, Gautam D...
CCS
2010
ACM
15 years 4 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
INFOCOM
2009
IEEE
15 years 4 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
SENSYS
2005
ACM
15 years 3 months ago
TSAR: a two tier sensor storage architecture using interval skip graphs
Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems a...
Peter Desnoyers, Deepak Ganesan, Prashant J. Sheno...
ICDCSW
2006
IEEE
15 years 3 months ago
Semantic Data Extraction for B2B Integration
Business-to-business (B2B) data exchange and integration is a common daily operation in today’s organizations. These operations are crucial since they affect organizations’ ca...
Bruno Silva, Jorge Cardoso