Sciweavers

1830 search results - page 138 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2010
IEEE
244views Database» more  ICDE 2010»
14 years 10 months ago
Reliable Storage and Querying for Collaborative Data Sharing Systems
The sciences, business confederations, and medicine urgently need infrastructure for sharing data and updates among collaborators' constantly changing, heterogeneous databases...
Nicholas E. Taylor, Zachary G. Ives
ICDE
2007
IEEE
116views Database» more  ICDE 2007»
14 years 4 months ago
On-Line Index Selection for Shifting Workloads
This paper introduces COLT (Continuous On-Line Tuning), a novel framework that continuously monitors the workload of a database system and enriches the existing physical design wi...
Karl Schnaitter, Serge Abiteboul, Tova Milo, Neokl...
GLOBECOM
2007
IEEE
14 years 4 months ago
A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System
Abstract—Network Intrusion Detection and Prevention Systems (NIDPSs) are vital in the fight against network intrusions. NIDPSs search for certain malicious content in network tr...
N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, H. Jo...
KES
2004
Springer
14 years 3 months ago
FESMI: A Fuzzy Expert System for Diagnosis and Treatment of Male Impotence
In this paper, we present the design, implementation and evaluation of FESMI, a fuzzy expert system that deals with diagnosis and treatment of male impotence. The diagnosis process...
Constantinos Koutsojannis, Ioannis Hatzilygeroudis
ER
2004
Springer
125views Database» more  ER 2004»
14 years 3 months ago
Expressive Profile Specification and Its Semantics for a Web Monitoring System
Abstract. World wide web has gained a lot of prominence with respect to information retrieval and data delivery. With such a prolific growth, a user interested in a specific change...
Ajay Eppili, Jyoti Jacob, Alpa Sachde, Sharma Chak...