Sciweavers

12052 search results - page 1995 / 2411
» computing 2010
Sort
View
SACMAT
2010
ACM
15 years 9 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
SIGECOM
2010
ACM
137views ECommerce» more  SIGECOM 2010»
15 years 9 months ago
Prediction without markets
Citing recent successes in forecasting elections, movies, products, and other outcomes, prediction market advocates call for widespread use of market-based methods for government ...
Sharad Goel, Daniel M. Reeves, Duncan J. Watts, Da...
SIGMOD
2010
ACM
259views Database» more  SIGMOD 2010»
15 years 9 months ago
PODS: a new model and processing algorithms for uncertain data streams
Uncertain data streams, where data is incomplete, imprecise, and even misleading, have been observed in many environments. Feeding such data streams to existing stream systems pro...
Thanh T. L. Tran, Liping Peng, Boduo Li, Yanlei Di...
SIGMOD
2010
ACM
273views Database» more  SIGMOD 2010»
15 years 9 months ago
Google fusion tables: web-centered data management and collaboration
It has long been observed that database management systems focus on traditional business applications, and that few people use a database management system outside their workplace...
Hector Gonzalez, Alon Y. Halevy, Christian S. Jens...
SIGMOD
2010
ACM
171views Database» more  SIGMOD 2010»
15 years 9 months ago
Variance aware optimization of parameterized queries
Parameterized queries are commonly used in database applications. In a parameterized query, the same SQL statement is potentially executed multiple times with different parameter ...
Surajit Chaudhuri, Hongrae Lee, Vivek R. Narasayya
« Prev « First page 1995 / 2411 Last » Next »