Sciweavers

1291 search results - page 217 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SIGMOD
2010
ACM
208views Database» more  SIGMOD 2010»
13 years 9 months ago
Hierarchically organized skew-tolerant histograms for geographic data objects
Histograms have been widely used for fast estimation of query result sizes in query optimization. In this paper, we propose a new histogram method, called the Skew-Tolerant Histog...
Yohan J. Roh, Jae Ho Kim, Yon Dohn Chung, Jin Hyun...
IAJIT
2010
133views more  IAJIT 2010»
13 years 7 months ago
Mediation Queries Adaptation After the Removal of a Data Source
: A broad variety of data is available in distinct heterogeneous sources, stored under different formats: database formats (in relational and object-oriented models), document form...
Latifa Baba-hamed
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
14 years 10 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin
SAC
2005
ACM
14 years 2 months ago
Adaptive and fault tolerant medical vest for life-critical medical monitoring
In recent years, exciting technological advances have been made in development of flexible electronics. These technologies offer the opportunity to weave computation, communicat...
Roozbeh Jafari, Foad Dabiri, Philip Brisk, Majid S...
PODS
2007
ACM
203views Database» more  PODS 2007»
14 years 8 months ago
Decision trees for entity identification: approximation algorithms and hardness results
We consider the problem of constructing decision trees for entity identification from a given relational table. The input is a table containing information about a set of entities...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Samb...