Sciweavers

928 search results - page 107 / 186
» Analysis and optimization of active databases
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 11 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
PODS
2006
ACM
107views Database» more  PODS 2006»
14 years 11 months ago
Programmable clustering
We initiate a novel study of clustering problems. Rather than specifying an explicit objective function to optimize, our framework allows the user of clustering algorithm to speci...
Sreenivas Gollapudi, Ravi Kumar, D. Sivakumar
JIT
1999
Springer
123views Database» more  JIT 1999»
14 years 3 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm
SEDE
2010
13 years 9 months ago
Metadata Services for Distributed Event Stream Processing Agents
Enterprise-level applications are becoming complex with the need for event and stream processing, multiple query processing and data analysis over heterogeneous data sources such ...
Mahesh B. Chaudhari, Suzanne W. Dietrich
SCAM
2008
IEEE
14 years 5 months ago
Exploiting the Correspondence between Micro Patterns and Class Names
This paper argues that semantic information encoded in natural language identifiers is a largely neglected resource for program analysis. First we show that words in Java class n...
Jeremy Singer, Chris C. Kirkham