Sciweavers

274 search results - page 36 / 55
» Ad-hoc data processing in the cloud
Sort
View
WECWIS
2007
IEEE
131views ECommerce» more  WECWIS 2007»
14 years 2 months ago
Event Cloud - Searching for Correlated Business Events
Market players that can respond to critical business events faster than their competitors will end up as winners in the fast moving economy. Event-based systems have been develope...
Szabolcs Rozsnyai, Roland Vecera, Josef Schiefer, ...
ICDCS
2012
IEEE
11 years 10 months ago
PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems
Abstract—Virtualized cloud systems are prone to performance anomalies due to various reasons such as resource contentions, software bugs, and hardware failures. In this paper, we...
Yongmin Tan, Hiep Nguyen, Zhiming Shen, Xiaohui Gu...
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 8 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
NAR
1998
229views more  NAR 1998»
13 years 7 months ago
GDB: the Human Genome Database
The Genome Database (GDB, http://www.gdb.org ) is a public repository of data on human genes, clones, STSs, polymorphisms and maps. GDB entries are highly cross-linked to each oth...
Stanley Letovsky, Robert W. Cottingham, Christophe...
CACM
2010
117views more  CACM 2010»
13 years 8 months ago
Computing arbitrary functions of encrypted data
Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorph...
Craig Gentry