Sciweavers

202 search results - page 25 / 41
» Exploiting predicate-window semantics over data streams
Sort
View
117
Voted
CCS
2005
ACM
15 years 8 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
231
Voted
SIGMOD
2008
ACM
162views Database» more  SIGMOD 2008»
16 years 2 months ago
Event queries on correlated probabilistic streams
A major problem in detecting events in streams of data is that the data can be imprecise (e.g. RFID data). However, current state-ofthe-art event detection systems such as Cayuga ...
Christopher Ré, Dan Suciu, Julie Letchner, ...
136
Voted
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
13 years 10 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
121
Voted
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
15 years 8 months ago
Content and Context Aware Networking Using Semantic Tagging
Today’s model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple“best-effort”,“data agnostic” communication med...
Sethuram Balaji Kodeswaran, Anupam Joshi
201
Voted
SIGMOD
2006
ACM
202views Database» more  SIGMOD 2006»
16 years 2 months ago
Avatar semantic search: a database approach to information retrieval
We present Avatar Semantic Search, a prototype search engine that exploits annotations in the context of classical keyword search. The process of annotations is accomplished offli...
Eser Kandogan, Rajasekar Krishnamurthy, Sriram Rag...