Sciweavers

3741 search results - page 173 / 749
» Monitoring Database Objects
Sort
View
SIGKDD
2002
232views more  SIGKDD 2002»
13 years 7 months ago
The True Lift Model - A Novel Data Mining Approach to Response Modeling in Database Marketing
In database marketing, data mining has been used extensively to find the optimal customer targets so as to maximize return on investment. In particular, using marketing campaign d...
Victor S. Y. Lo
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 8 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
RV
2010
Springer
220views Hardware» more  RV 2010»
13 years 6 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu
ICETE
2004
204views Business» more  ICETE 2004»
13 years 9 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
SIGMOD
2003
ACM
127views Database» more  SIGMOD 2003»
14 years 8 months ago
Cache-and-Query for Wide Area Sensor Databases
Webcams, microphones, pressure gauges and other sensors provide exciting new opportunities for querying and monitoring the physical world. In this paper we focus on querying wide ...
Amol Deshpande, Suman Kumar Nath, Phillip B. Gibbo...