Sciweavers

299 search results - page 33 / 60
» Implicit Enumeration of Patterns
Sort
View
VLDB
2005
ACM
139views Database» more  VLDB 2005»
14 years 3 months ago
Analyzing Plan Diagrams of Database Query Optimizers
A “plan diagram” is a pictorial enumeration of the execution plan choices of a database query optimizer over the relational selectivity space. In this paper, we present and an...
Naveen Reddy, Jayant R. Haritsa
ISW
2004
Springer
14 years 3 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier
WWW
2010
ACM
13 years 10 months ago
Exploiting content redundancy for web information extraction
We propose a novel extraction approach that exploits content redundancy on the web to extract structured data from template-based web sites. We start by populating a seed database...
Pankaj Gulhane, Rajeev Rastogi, Srinivasan H. Seng...
CCR
2004
151views more  CCR 2004»
13 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
CSCW
2012
ACM
12 years 5 months ago
Finding a new normal: the role of technology in life disruptions
In recent years, the HCI and CSCW communities have begun to examine the role technology plays in personal, rather than professional settings. Part of this work has begun to addres...
Michael Massimi, Jill P. Dimond, Christopher A. Le...