Sciweavers

1078 search results - page 69 / 216
» Analyzing DB2 Data Sharing Performance Problems
Sort
View
ICDE
2003
IEEE
102views Database» more  ICDE 2003»
14 years 10 months ago
Schema Mediation in Peer Data Management Systems
Intuitively, data management and data integration tools should be well-suited for exchanging information in a semantically meaningful way. Unfortunately, they suffer from two sign...
Alon Y. Halevy, Zachary G. Ives, Dan Suciu, Igor T...
AAAI
1998
13 years 10 months ago
Optimizing Information Agents by Selectively Materializing Data
We present an approach for optimizing the performance of information agents by materializing useful information . A critical problem with information agents, particularly those ga...
Naveen Ashish
RAID
2010
Springer
13 years 7 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
IDA
1997
Springer
14 years 1 months ago
How to Find Big-Oh in Your Data Set (and How Not to)
The empirical curve bounding problem is de ned as follows. Suppose data vectors X Y are presented such that E(Y i]) = f(X i]) where f(x) is an unknown function. The problem is to a...
Catherine C. McGeoch, Doina Precup, Paul R. Cohen
ACSAC
2008
IEEE
14 years 3 months ago
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries
Securely authenticating a human user without assistance from any auxiliary device in the presence of powerful passive adversaries is an important and challenging problem. Passive ...
Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang...