Sciweavers

14348 search results - page 154 / 2870
» Active Database Systems
Sort
View
VLDB
2007
ACM
139views Database» more  VLDB 2007»
14 years 10 months ago
Self-Tuning Database Systems: A Decade of Progress
In this paper we discuss advances in self-tuning database systems over the past decade, based on our experience in the AutoAdmin project at Microsoft Research. This paper primaril...
Surajit Chaudhuri, Vivek R. Narasayya
ICDE
2006
IEEE
128views Database» more  ICDE 2006»
14 years 4 months ago
Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology
The Sarbanes-Oxley Act instituted a series of corporate reforms to improve the accuracy and reliability of financial reporting. Sections 302 and 404 of the Act require SEC-reporti...
Rakesh Agrawal, Christopher M. Johnson, Jerry Kier...
JSW
2007
138views more  JSW 2007»
13 years 10 months ago
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
— The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
Veselina G. Jecheva, Evgeniya P. Nikolova
ICEIS
2002
IEEE
14 years 3 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
POLICY
2001
Springer
14 years 2 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...