Sciweavers

4526 search results - page 892 / 906
» Algorithmic problems related to the Internet
Sort
View
VLDB
2007
ACM
137views Database» more  VLDB 2007»
14 years 2 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
ACMSE
2006
ACM
14 years 2 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
IUI
2006
ACM
14 years 2 months ago
Towards intelligent QA interfaces: discourse processing for context questions
Question answering (QA) systems take users’ natural language questions and retrieve relevant answers from large repositories of free texts. Despite recent progress in QA researc...
Mingyu Sun, Joyce Y. Chai
SBCCI
2006
ACM
139views VLSI» more  SBCCI 2006»
14 years 2 months ago
Infrastructure for dynamic reconfigurable systems: choices and trade-offs
Platform-based design is a method to implement complex SoCs, avoiding chip design from scratch. A promising evolution of platform-based design are MPSoC. Such generic architecture...
Leandro Möller, Rafael Soares, Ewerson Carval...
DSN
2005
IEEE
14 years 2 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...