Sciweavers

888 search results - page 138 / 178
» Digital detective - Bluetooth
Sort
View
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 4 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
SIGSOFT
2005
ACM
14 years 8 months ago
Matching execution histories of program versions
We develop a method for matching dynamic histories of program executions of two program versions. The matches produced can be useful in many applications including software piracy...
Xiangyu Zhang, Rajiv Gupta
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
14 years 8 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
KDD
2008
ACM
213views Data Mining» more  KDD 2008»
14 years 8 months ago
Heterogeneous data fusion for alzheimer's disease study
Effective diagnosis of Alzheimer's disease (AD) is of primary importance in biomedical research. Recent studies have demonstrated that neuroimaging parameters are sensitive a...
Jieping Ye, Kewei Chen, Teresa Wu, Jing Li, Zheng ...
SIGMOD
2008
ACM
162views Database» more  SIGMOD 2008»
14 years 7 months ago
Event queries on correlated probabilistic streams
A major problem in detecting events in streams of data is that the data can be imprecise (e.g. RFID data). However, current state-ofthe-art event detection systems such as Cayuga ...
Christopher Ré, Dan Suciu, Julie Letchner, ...