Sciweavers

3780 search results - page 593 / 756
» Algorithms for Game Metrics
Sort
View
112
Voted
WWW
2008
ACM
16 years 4 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
SIGMOD
2009
ACM
133views Database» more  SIGMOD 2009»
16 years 3 months ago
Hierarchical result views for keyword queries over relational databases
Enabling keyword queries over relational databases (KQDB) benefits a large population of users who have difficulty in understanding the database schema or using SQLs. However, sin...
Shiyuan Wang, Jun'ichi Tatemura, Arsany Sawires, O...
203
Voted
SIGMOD
2009
ACM
167views Database» more  SIGMOD 2009»
16 years 3 months ago
Exploring schema repositories with schemr
Schemr is a schema search engine, and provides users the ability to search for and visualize schemas stored in a metadata repository. Users may search by keywords and by example ?...
Kuang Chen, Jayant Madhavan, Alon Y. Halevy
207
Voted
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
16 years 3 months ago
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous aut...
Yin Yang, Dimitris Papadias, Stavros Papadopoulos,...
126
Voted
DCC
2008
IEEE
16 years 3 months ago
Simultaneous Encryption/Compression of Images Using Alpha Rooting
Significant work has been done in the areas of image encryption and compression as two independent problems, yet the two areas are strongly interleaved and should be considered si...
Eric J. Wharton, Karen Panetta, Sos S. Agaian