Sciweavers

4266 search results - page 213 / 854
» The container loading problem
Sort
View
ICDE
2005
IEEE
176views Database» more  ICDE 2005»
16 years 5 months ago
Optimizing ETL Processes in Data Warehouses
Extraction-Transformation-Loading (ETL) tools are pieces of software responsible for the extraction of data from several sources, their cleansing, customization and insertion into...
Alkis Simitsis, Panos Vassiliadis, Timos K. Sellis
ADBIS
2009
Springer
151views Database» more  ADBIS 2009»
15 years 11 months ago
Rule-Based Management of Schema Changes at ETL Sources
In this paper, we visit the problem of the management of inconsistencies emerging on ETL processes as results of evolution operations g at their sources. We abstract Extract-Transf...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
DSOM
2009
Springer
15 years 10 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
TPCTC
2009
Springer
101views Hardware» more  TPCTC 2009»
15 years 10 months ago
Benchmarking ETL Workflows
Extraction–Transform–Load (ETL) processes comprise complex data workflows, which are responsible for the maintenance of a Data Warehouse. A plethora of ETL tools is currently a...
Alkis Simitsis, Panos Vassiliadis, Umeshwar Dayal,...
ICPADS
2008
IEEE
15 years 10 months ago
Bootstrapping in Peer-to-Peer Systems
Peer-to-Peer systems have become a substantial element in computer networking. Distributing the load and splitting complex tasks are only some reasons why many developers have com...
Mirko Knoll, Arno Wacker, Gregor Schiele, Torben W...