Sciweavers

1480 search results - page 49 / 296
» Supporting Real-world Activities in Database Management Syst...
Sort
View
ICDE
2011
IEEE
247views Database» more  ICDE 2011»
14 years 1 months ago
Process flexibility through customizable activities: A mashup-based approach
Abstract— In several contexts, the success of Workflow applications is limited by the excess of rigidity of workflow enactment, which leaves no freedom to end-users to “custo...
Marco Fisichella, Maristella Matera
DEXAW
2000
IEEE
88views Database» more  DEXAW 2000»
15 years 2 months ago
Spatio-Temporal Databases: Contentions, Components and Consolidation
Spatio-temporal databases have been the focus of considerable research activity over a significant period. However, there are as of yet very few prototypes of complete systems, f...
Norman W. Paton, Alvaro A. A. Fernandes, Tony Grif...
LNCS
1993
15 years 1 months ago
Multimedia Database Systems
– In the past few years considerable demand for user oriented multimedia information systems has developed. These systems must provide a rich set of functionality so that new, co...
Arif Ghafoor, P. Bruce Berra
POLICY
2001
Springer
15 years 2 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson