Sciweavers

9162 search results - page 1588 / 1833
» System and User Data Complexity
Sort
View
ICFP
2010
ACM
15 years 5 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
TSP
2008
123views more  TSP 2008»
15 years 3 months ago
MIMO Radar Space-Time Adaptive Processing Using Prolate Spheroidal Wave Functions
In the traditional transmitting beamforming radar system, the transmitting antennas send coherent waveforms which form a highly focused beam. In the multiple-input multipleoutput (...
Chun-Yang Chen, Palghat P. Vaidyanathan
143
Voted
SIGMOD
2010
ACM
199views Database» more  SIGMOD 2010»
15 years 1 months ago
Keyword search across databases and documents
Given the continuous growth of databases and the abundance of diverse files in modern IT environments, there is a pressing need to integrate keyword search on heterogeneous inform...
Carlos Garcia-Alvarado, Carlos Ordonez
136
Voted
SEMWEB
2009
Springer
15 years 10 months ago
Results of GeRoMeSuite for OAEI 2009
GeRoMeSuite is a generic model management system which provides several functions for managing complex data models, such as schema integration, definition and execution of schema ...
Christoph Quix, Sandra Geisler, David Kensche, Xia...
139
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
« Prev « First page 1588 / 1833 Last » Next »