Sciweavers

889 search results - page 141 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
113
Voted
CAISE
1999
Springer
15 years 7 months ago
Designing the Global Data Warehouse with SPJ Views
Abstract. A global Data warehouse (DW) integrates data from multiple distributed heterogeneous databases and other information sources. DW can be abstractly seen as a set of materi...
Dimitri Theodoratos, Spyros Ligoudistianos, Timos ...
138
Voted
CASCON
2008
111views Education» more  CASCON 2008»
15 years 4 months ago
DBMS workload control using throttling: experimental insights
Today's database management systems (DBMSs) are required to handle diverse, mixed workloads and to provide differentiated levels of service to ensure that critical work takes...
Wendy Powley, Patrick Martin, Paul Bird
126
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 3 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
142
Voted
GIR
2006
ACM
15 years 8 months ago
On metonymy recognition for geographic IR
Metonymic location names refer to other, related entities and possess a meaning different from the literal, geographic sense. Metonymic names are to be treated differently to im...
Johannes Leveling, Sven Hartrumpf
121
Voted
CCS
2009
ACM
15 years 9 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin