Sciweavers

2309 search results - page 215 / 462
» Using Meta-Structures in Database Design
Sort
View
134
Voted
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 9 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
119
Voted
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
15 years 9 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
122
Voted
OOPSLA
2005
Springer
15 years 9 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...
PREMI
2005
Springer
15 years 9 months ago
Towards Generic Pattern Mining
Frequent Pattern Mining (FPM) is a very powerful paradigm for mining informative and useful patterns in massive, complex datasets. In this paper we propose the Data Mining Template...
Mohammed Javeed Zaki, Nilanjana De, Feng Gao, Nage...
IDEAS
2003
IEEE
112views Database» more  IDEAS 2003»
15 years 8 months ago
Persistent Applications via Automatic Recovery
Building highly available enterprise applications using web-oriented middleware is hard. Runtime implementations frequently do not address the problems of application state persis...
Roger S. Barga, David B. Lomet, Stelios Paparizos,...