Sciweavers

54 search results - page 4 / 11
» A Holistic Approach for Managing Spyware
Sort
View
CIKM
2004
Springer
13 years 11 months ago
Efficient processing of XML twig patterns with parent child edges: a look-ahead approach
With the growing importance of semi-structure data in information exchange, much research has been done to provide an effective mechanism to match a twig query in an XML database....
Jiaheng Lu, Ting Chen, Tok Wang Ling
WWW
2005
ACM
14 years 8 months ago
Answering order-based queries over XML data
Order-based queries over XML data include XPath navigation axes such as following-sibling and following. In this paper, we present holistic algorithms that evaluate such order-bas...
Zografoula Vagena, Nick Koudas, Divesh Srivastava,...
EMISA
2005
Springer
14 years 27 days ago
A Comprehensive Enterprise Architecture Metamodel
Abstract Due to the growing importance of alignment, compliance and manageability issues, increased attention is being paid to architectures and architecture management recently. A...
Christian Braun, Robert Winter
EDBT
2012
ACM
395views Database» more  EDBT 2012»
11 years 9 months ago
Data management with SAPs in-memory computing engine
We present some architectural and technological insights on SAP’s HANA database and derive research challenges for future enterprise application development. The HANA database m...
Joos-Hendrik Boese, Cafer Tosun, Christian Mathis,...
ACSAC
2005
IEEE
14 years 1 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth