Sciweavers

158 search results - page 21 / 32
» Conference Keynote Address
Sort
View
VLDB
2004
ACM
245views Database» more  VLDB 2004»
14 years 1 months ago
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
Walid Rjaibi, Paul Bird
SIGMOD
1998
ACM
97views Database» more  SIGMOD 1998»
13 years 12 months ago
Cost Based Query Scrambling for Initial Delays
Remote data access from disparate sources across a widearea network such as the Internet is problematic due to the unpredictable nature of the communications medium and the lack o...
Tolga Urhan, Michael J. Franklin, Laurent Amsaleg
CIKM
2008
Springer
13 years 9 months ago
A proposal for chemical information retrieval evaluation
Based on the important progresses made in information retrieval (IR) in terms of theoretical models and evaluations, more and more attention has recently been paid to the research...
Jianhan Zhu, John Tait
CN
2007
168views more  CN 2007»
13 years 7 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
NLE
2010
100views more  NLE 2010»
13 years 6 months ago
Formal and functional assessment of the pyramid method for summary content evaluation
Pyramid annotation makes it possible to evaluate quantitatively and qualitatively the content of machine-generated (or human) summaries. Evaluation methods must prove themselves a...
Rebecca J. Passonneau