Sciweavers

4926 search results - page 503 / 986
» Two Graph Algorithms On an Associative Computing Model
Sort
View
151
Voted
SIGMOD
2011
ACM
221views Database» more  SIGMOD 2011»
14 years 6 months ago
Scalable query rewriting: a graph-based approach
In this paper we consider the problem of answering queries using views, which is important for data integration, query optimization, and data warehouses. We consider its simplest ...
George Konstantinidis, José Luis Ambite
336
Voted
COCOON
2011
Springer
14 years 3 months ago
Finding Paths with Minimum Shared Edges
Motivated by a security problem in geographic information systems, we study the following graph theoretical problem: given a graph G, two special nodes s and t in G, and a number k...
Masoud T. Omran, Jörg-Rüdiger Sack, Hami...
121
Voted
PPPJ
2006
ACM
15 years 9 months ago
Juxta-Cat: a JXTA-based platform for distributed computing
In this paper we present a JXTA-based platform, called Juxta-CAT, which is an effort to use the JXTA architecture to build a job execution-sharing distributed environment. The Ju...
Joan Esteve Riasol, Fatos Xhafa
112
Voted
RAID
2005
Springer
15 years 9 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
127
Voted
IPPS
2005
IEEE
15 years 9 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...