Sciweavers

86 search results - page 14 / 18
» An architecture for the aggregation and analysis of scholarl...
Sort
View
ESORICS
2004
Springer
14 years 28 days ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
IJCSA
2008
237views more  IJCSA 2008»
13 years 7 months ago
Development of A SOLAP Patrimony Management Application System: Fez Medina as a Case Study
It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
I. Salam, M. El Mohajir, A. Taleb, B. El Mohajir
SIGMOD
2012
ACM
234views Database» more  SIGMOD 2012»
11 years 10 months ago
Oracle in-database hadoop: when mapreduce meets RDBMS
Big data is the tar sands of the data world: vast reserves of raw gritty data whose valuable information content can only be extracted at great cost. MapReduce is a popular parall...
Xueyuan Su, Garret Swart
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 9 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
IPSN
2005
Springer
14 years 1 months ago
The particle computer system
Abstract—This paper presents a sensor-based, networked embedded system, referred to as the Particle computer system. It is comprised of tiny wireless sensor nodes, capable of com...
Christian Decker, Albert Krohn, Michael Beigl, Tob...