Sciweavers

361 search results - page 68 / 73
» On Mining Web Access Logs
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 3 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
CLOUD
2010
ACM
14 years 2 months ago
Stateful bulk processing for incremental analytics
This work addresses the need for stateful dataflow programs that can rapidly sift through huge, evolving data sets. These data-intensive applications perform complex multi-step c...
Dionysios Logothetis, Christopher Olston, Benjamin...
VLDB
2002
ACM
193views Database» more  VLDB 2002»
13 years 9 months ago
REFEREE: An Open Framework for Practical Testing of Recommender Systems using ResearchIndex
Automated recommendation (e.g., personalized product recommendation on an ecommerce web site) is an increasingly valuable service associated with many databases--typically online ...
Dan Cosley, Steve Lawrence, David M. Pennock
ICDE
2007
IEEE
126views Database» more  ICDE 2007»
14 years 11 months ago
QPIAD: Query Processing over Incomplete Autonomous Databases
Incompleteness due to missing attribute values (aka "null values") is very common in autonomous web databases, on which user accesses are usually supported through media...
Hemal Khatri, Jianchun Fan, Yi Chen, Subbarao Kamb...
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
14 years 10 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray