Sciweavers

651 search results - page 94 / 131
» Negative Database for Data Security
Sort
View
SAC
2006
ACM
14 years 1 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
PKDD
2001
Springer
120views Data Mining» more  PKDD 2001»
14 years 6 days ago
Text Categorization and Semantic Browsing with Self-Organizing Maps on Non-euclidean Spaces
This paper introduces a new type of Self-Organizing Map (SOM) for Text Categorization and Semantic Browsing. We propose a “hyperbolic SOM” (HSOM) based on a regular tesselation...
Jörg Ontrup, Helge Ritter
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
14 years 2 months ago
Privacy Preserving Pattern Discovery in Distributed Time Series
The search for unknown frequent pattern is one of the core activities in many time series data mining processes. In this paper we present an extension of the pattern discovery pro...
Josenildo Costa da Silva, Matthias Klusch
OOPSLA
2007
Springer
14 years 1 months ago
Lost in translation: formalizing proposed extensions to c#
Current real-world software applications typically involve heavy use of relational and XML data and their query languages. Unfortunately object-oriented languages and database que...
Gavin M. Bierman, Erik Meijer, Mads Torgersen
OOPSLA
2005
Springer
14 years 1 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...