Sciweavers

150 search results - page 8 / 30
» Detecting anomalous access patterns in relational databases
Sort
View
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ICDE
2007
IEEE
209views Database» more  ICDE 2007»
14 years 1 months ago
Hierarchical Temporal Association Mining for Video Event Detection in Video Databases
With the proliferation of multimedia data and evergrowing requests for multimedia applications, new challenges are emerged for efficient and effective managing and accessing large...
Min Chen, Shu-Ching Chen, Mei-Ling Shyu
ICDT
2007
ACM
105views Database» more  ICDT 2007»
14 years 1 months ago
Optimization of Query Plans in the presence of Access Limitations
We consider the problem of querying data sources that have limited capabilities and can thus only be accessed by complying with certain binding patterns for their attributes. This ...
Andrea Calì, Diego Calvanese, Davide Martin...
IDEAS
2008
IEEE
153views Database» more  IDEAS 2008»
14 years 2 months ago
Pattern based processing of XPath queries
As the popularity of areas including document storage and distributed systems continues to grow, the demand for high performance XML databases is increasingly evident. This has le...
Gerard Marks, Mark Roantree
ICDE
2007
IEEE
108views Database» more  ICDE 2007»
13 years 11 months ago
Problem definition for effective workload management
The paper introduces the problem of designing dynamic workload management (WM) tools that are aware of the diversity of classes of users and their diverse access patterns. Our app...
Adrian M. Teisanu, Sam Lightstone, Mariano P. Cons...