Sciweavers

867 search results - page 91 / 174
» SQL Server 2005
Sort
View
99
Voted
FC
2005
Springer
97views Cryptology» more  FC 2005»
15 years 8 months ago
Time Capsule Signature
Abstract. We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time...
Yevgeniy Dodis, Dae Hyun Yum
135
Voted
VLDB
2005
ACM
140views Database» more  VLDB 2005»
15 years 8 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu
223
Voted
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
16 years 4 months ago
Design, Implementation, and Evaluation of a Repairable Database Management System
Although conventional database management systems are designed to tolerate hardware and to a lesser extent even software errors, they cannot protect themselves against syntactical...
Tzi-cker Chiueh, Dhruv Pilania
152
Voted
ECCB
2005
IEEE
15 years 8 months ago
A query language for biological networks
Many areas of modern biology are concerned with the management, storage, visualization, comparison, and analysis of networks. For instance, networks are used to model signal trans...
Ulf Leser
115
Voted
SSDBM
2005
IEEE
122views Database» more  SSDBM 2005»
15 years 8 months ago
Detection and Tracking of Discrete Phenomena in Sensor-Network Databases
This paper introduces a framework for Phenomena Detection and Tracking (PDT, for short) in sensor network databases. Examples of detectable phenomena include the propagation over ...
Mohamed H. Ali, Mohamed F. Mokbel, Walid G. Aref, ...