Sciweavers

257 search results - page 50 / 52
» A New Model for Dynamic Intrusion Detection
Sort
View
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 2 months ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
WCRE
2003
IEEE
14 years 24 days ago
GUI Ripping: Reverse Engineering of Graphical User Interfaces for Testing
Graphical user interfaces (GUIs) are important parts of today’s software and their correct execution is required to ensure the correctness of the overall software. A popular tec...
Atif M. Memon, Ishan Banerjee, Adithya Nagarajan
SIGMOD
2000
ACM
158views Database» more  SIGMOD 2000»
13 years 12 months ago
NiagaraCQ: A Scalable Continuous Query System for Internet Databases
Continuous queries are persistent queries that allow users to receive new results when they become available. While continuous query systems can transform a passive web into an ac...
Jianjun Chen, David J. DeWitt, Feng Tian, Yuan Wan...
WSC
2000
13 years 8 months ago
SNOOPy Calendar Queue
Discrete event simulations often require a future event list structure to manage events according to their timestamp. The choice of an efficient data structure is vital to the per...
Kah Leong Tan, Ian Li-Jin Thng
BMCBI
2008
150views more  BMCBI 2008»
13 years 7 months ago
13C labeling experiments at metabolic nonstationary conditions: An exploratory study
Background: Stimulus Response Experiments to unravel the regulatory properties of metabolic networks are becoming more and more popular. However, their ability to determine enzyme...
Sebastian Aljoscha Wahl, Katharina Nöh, Wolfg...