Sciweavers

150 search results - page 7 / 30
» Detecting anomalous access patterns in relational databases
Sort
View
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
13 years 11 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
ICDT
2005
ACM
130views Database» more  ICDT 2005»
14 years 1 months ago
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints
We study the problem of rewriting queries using views in the presence of access patterns, integrity constraints, disjunction, and negation. We provide asymptotically optimal algori...
Alin Deutsch, Bertram Ludäscher, Alan Nash
PKDD
2007
Springer
95views Data Mining» more  PKDD 2007»
14 years 1 months ago
Pruning Relations for Substructure Discovery of Multi-relational Databases
Multirelational data mining methods discover patterns across multiple interlinked tables (relations) in a relational database. In many large organizations, such a multi-relational ...
Hongyu Guo, Herna L. Viktor, Eric Paquet

Dataset
764views
13 years 11 months ago
PItowns: Evaluation database for sign detection
Traffic Image database for the evaluation of road signs extraction algorithms. In any publication related to the use of this image database, your are kindly requested to cite the ...
NAR
2011
225views Computer Vision» more  NAR 2011»
12 years 10 months ago
IsoBase: a database of functionally related proteins across PPI networks
We describe IsoBase, a database identifying functionally related proteins, across five major eukaryotic model organisms: Saccharomyces cerevisiae, Drosophila melanogaster, Caenorh...
Daniel Park, Rohit Singh, Michael Baym, Chung-Shou...