Sciweavers

150 search results - page 12 / 30
» Detecting anomalous access patterns in relational databases
Sort
View
ICDE
2010
IEEE
220views Database» more  ICDE 2010»
13 years 5 months ago
Profiling linked open data with ProLOD
Linked open data (LOD), as provided by a quickly growing number of sources constitutes a wealth of easily accessible information. However, this data is not easy to understand. It i...
Christoph Böhm, Felix Naumann, Ziawasch Abedj...
SIGMOD
2007
ACM
196views Database» more  SIGMOD 2007»
14 years 7 months ago
Adaptive location constraint processing
An important problem for many location-based applications is the continuous evaluation of proximity relations among moving objects. These relations express whether a given set of ...
Zhengdao Xu, Hans-Arno Jacobsen
JIDM
2010
145views more  JIDM 2010»
13 years 6 months ago
Mining Relevant and Extreme Patterns on Climate Time Series with CLIPSMiner
One of the most important challenges for the researchers in the 21st Century is related to global heating and climate change that can have as consequence the intensiļ¬cation of na...
Luciana A. S. Romani, Ana Maria Heuminski de &Aacu...
BMCBI
2006
159views more  BMCBI 2006»
13 years 7 months ago
ProtRepeatsDB: a database of amino acid repeats in genomes
Background: Genome wide and cross species comparisons of amino acid repeats is an intriguing problem in biology mainly due to the highly polymorphic nature and diverse functions o...
Mridul K. Kalita, Gowthaman Ramasamy, Sekhar Durai...
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
13 years 11 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna