Sciweavers

1347 search results - page 146 / 270
» Towards a Secure Data Stream Management System
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 10 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 4 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
POPL
2005
ACM
16 years 4 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
222
Voted
ICDT
2009
ACM
130views Database» more  ICDT 2009»
16 years 5 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
IQ
2004
15 years 6 months ago
An Algebraic Approach to Quality Metrics for Customer Recognition Systems
: Success in implementing a Customer Relationship Management (CRM) system requires close attention to data quality issues. However, most of the literature focuses on the quality of...
John R. Talburt, Kimberly Hess, Richard Wang, Emil...