Sciweavers

1037 search results - page 191 / 208
» Application Management Techniques for the Bifrost System
Sort
View
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 8 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
SIGMOD
2005
ACM
153views Database» more  SIGMOD 2005»
14 years 7 months ago
Multiple Aggregations Over Data Streams
Monitoring aggregates on IP traffic data streams is a compelling application for data stream management systems. The need for exploratory IP traffic data analysis naturally leads ...
Rui Zhang 0003, Nick Koudas, Beng Chin Ooi, Divesh...
ICDM
2007
IEEE
95views Data Mining» more  ICDM 2007»
14 years 2 months ago
Incremental Quantization for Aging Data Streams
A growing number of applications have become reliant or can benefit from monitoring data streams. Data streams are potentially unbounded in size, hence, Data Stream Management Sy...
Fatih Altiparmak, David Chiu, Hakan Ferhatosmanogl...
MM
2005
ACM
179views Multimedia» more  MM 2005»
14 years 1 months ago
Automatic identification of digital video based on shot-level sequence matching
To locate a video clip in large collections is very important for retrieval applications, especially for digital rights management. In this paper, we present a novel technique for...
Jian Zhou, Xiao-Ping Zhang
DSOM
2005
Springer
14 years 1 months ago
Control Considerations for Scalable Event Processing
The growth in the scale of systems and networks has created many challenges for their management, especially for event processing. Our premise is that scaling event processing requ...
Wei Xu, Joseph L. Hellerstein, Bill Kramer, David ...