Sciweavers

87 search results - page 14 / 18
» Distributed Monitoring of Frequent Items
Sort
View
SASO
2008
IEEE
14 years 2 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
DAIS
2009
13 years 8 months ago
SoundPark: Towards Highly Collaborative Game Support in a Ubiquitous Computing Architecture
Ubiquitous computing architectures enable interaction and collaboration in multi-user applications. We explore the challenges of integrating the disparate services required in such...
Romain Pellerin, Nicolas Bouillot, Tatiana Pietkie...
USS
2010
13 years 5 months ago
Baaz: A System for Detecting Access Control Misconfigurations
Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
ESA
2005
Springer
107views Algorithms» more  ESA 2005»
14 years 1 months ago
Workload-Optimal Histograms on Streams
Histograms are used in many ways in conventional databases and in data stream processing for summarizing massive data distributions. Previous work on constructing histograms on da...
S. Muthukrishnan, Martin Strauss, X. Zheng
PODS
2011
ACM
238views Database» more  PODS 2011»
12 years 10 months ago
Beyond simple aggregates: indexing for summary queries
Database queries can be broadly classified into two categories: reporting queries and aggregation queries. The former retrieves a collection of records from the database that mat...
Zhewei Wei, Ke Yi