Sciweavers

978 search results - page 173 / 196
» Xyleme Query Architecture
Sort
View
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
15 years 4 months ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel
67
Voted
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
15 years 4 months ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...
86
Voted
DCOSS
2010
Springer
15 years 4 months ago
Halo: Managing Node Rendezvous in Opportunistic Sensor Networks
One vision of an opportunistic sensor network (OSN) uses sensor access points (SAPs) to assign mobile sensors with sensing tasks submitted by applications that could be running any...
Shane B. Eisenman, Hong Lu, Andrew T. Campbell
DOLAP
2000
ACM
15 years 3 months ago
Incremental Update to Aggregated Information for Data Warehouses over Internet
We consider the view maintenance problem in a web-based environment, in which clients query information from databases, stored in the form of materialized data warehouses, without...
Miranda Chan, Hong Va Leong, Antonio Si
75
Voted
AIIA
1999
Springer
15 years 3 months ago
An Implementation for Abductive Logic Agents
This paper presents thedistributed implementationof ALIAS, an architecture composed of several cooperating intelligent agents. This system is particularly suited to solve problems ...
Anna Ciampolini, Evelina Lamma, Paola Mello, Cesar...