Sciweavers

108 search results - page 13 / 22
» Continuous authentication on relational streams
Sort
View
JNW
2008
126views more  JNW 2008»
13 years 7 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
IDEAS
2008
IEEE
114views Database» more  IDEAS 2008»
14 years 2 months ago
Incremental view-based analysis of stock market data streams
In this paper we show the usefulness and feasibility of applying conventional SQL queries for analyzing a wide spectrum of data streams. As application area we have chosen the ana...
Andreas Behrend, Christian Dorau, Rainer Manthey, ...
OTM
2009
Springer
14 years 2 months ago
Evaluating Transport Protocols for Real-Time Event Stream Processing Middleware and Applications
Real-time event stream processing (RT-ESP) applications must synchronize continuous data streams despite fluctuations in resource availability. Satisfying these needs of RT-ESP ap...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...
VLDB
2007
ACM
130views Database» more  VLDB 2007»
14 years 7 months ago
A Simple and Efficient Estimation Method for Stream Expression Cardinalities
Estimating the cardinality (i.e. number of distinct elements) of an arbitrary set expression defined over multiple distributed streams is one of the most fundamental queries of in...
Aiyou Chen, Jin Cao, Tian Bu
SIGMOD
2003
ACM
193views Database» more  SIGMOD 2003»
14 years 7 months ago
Chain : Operator Scheduling for Memory Minimization in Data Stream Systems
In many applications involving continuous data streams, data arrival is bursty and data rate fluctuates over time. Systems that seek to give rapid or real-time query responses in ...
Brian Babcock, Shivnath Babu, Mayur Datar, Rajeev ...