Sciweavers

4564 search results - page 758 / 913
» Data Integration Using ID-Logic
Sort
View
WISEC
2009
ACM
14 years 5 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
ICDE
2007
IEEE
161views Database» more  ICDE 2007»
14 years 4 months ago
How to scalably and accurately skip past streams
Data stream methods look at each new item of the stream, perform a small number of operations while keeping a small amount of memory, and still perform muchneeded analyses. Howeve...
Supratik Bhattacharyya, André Madeira, S. M...
SENSYS
2005
ACM
14 years 3 months ago
Sensor networks for medical care
Sensor networks have the potential to greatly impact many aspects of medical care. By outfitting patients with wireless, wearable vital sign sensors, collecting detailed real-tim...
Victor Shnayder, Bor-rong Chen, Konrad Lorincz, Th...
DAWAK
2005
Springer
14 years 3 months ago
Processing Sequential Patterns in Relational Databases
Database integration of data mining has gained popularity and its significance is well recognized. However, the performance of SQL based data mining is known to fall behind specia...
Xuequn Shang, Kai-Uwe Sattler
CAISE
2003
Springer
14 years 3 months ago
Introducing Custom Language Extensions to SQL: 1999
Abstract. Even though SQL has become widely accepted as a language for implementing relational database schemas and querying data, there are cases where s experience the need for n...
Jernej Kovse, Wolfgang Mahnke