Sciweavers

3767 search results - page 167 / 754
» Design and implementation of a generalized laboratory data m...
Sort
View
ESSOS
2009
Springer
14 years 1 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
ATAL
2008
Springer
13 years 11 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
GIS
2006
ACM
14 years 10 months ago
Representation of periodic moving objects in databases
In the real world, lots of objects with changing position can be found. Some of them repeat the same movement several times, called periodic movements. Examples include airplanes,...
Ralf Hartmut Güting, Thomas Behr, Victor Teix...
LAWEB
2007
IEEE
14 years 3 months ago
Designing the Interface of Rich Internet Applications
In this paper we present a novel approach for designing the interface of rich internet applications. Our approach uses ract Data Views (ADV) design model allowing expressing in a ...
Matias Urbieta, Gustavo Rossi, Jeronimo Ginzburg, ...
ICDE
2009
IEEE
171views Database» more  ICDE 2009»
14 years 4 months ago
CoTS: A Scalable Framework for Parallelizing Frequency Counting over Data Streams
Applications involving analysis of data streams have gained significant popularity and importance. Frequency counting, frequent elements and top-k queries form a class of operato...
Sudipto Das, Shyam Antony, Divyakant Agrawal, Amr ...