Sciweavers

516 search results - page 36 / 104
» A Pattern System for Network Management Interfaces
Sort
View
RAID
2010
Springer
13 years 6 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
14 years 8 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
IPPS
1999
IEEE
14 years 21 hour ago
Mechanisms for Just-in-Time Allocation of Resources to Adaptive Parallel Programs
Adaptive parallel computations--computations that can adapt to changes in resource availability and requirement--can effectively use networked machines because they dynamically ex...
Arash Baratloo, Ayal Itzkovitz, Zvi M. Kedem, Yuan...
CSCW
2008
ACM
13 years 9 months ago
Influences on tag choices in del.icio.us
Collaborative tagging systems have the potential to produce socially constructed information organization schemes. The effectiveness of tags for finding and re-finding information...
Emilee J. Rader, Rick Wash
SRDS
1999
IEEE
14 years 12 hour ago
Information Dissemination in Partitionable Mobile Ad Hoc Networks
Ad-hoc wireless networks have no wired component, and may have unpredictable mobility pattern. Such networks can get partitioned and reconnected several times. One possible approa...
Goutham Karumanchi, Srinivasan Muralidharan, Ravi ...