Sciweavers

1457 search results - page 220 / 292
» Privacy Challenges for Database Systems
Sort
View
212
Voted
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
16 years 4 months ago
Universal Resource Lifecycle Management
This paper presents a model and a tool that allows Web users to define, execute, and manage lifecycles for any artifact available on the Web. In the paper we show the need for life...
Marcos Báez, Fabio Casati, Maurizio Marches...
120
Voted
CIDR
2007
144views Algorithms» more  CIDR 2007»
15 years 4 months ago
Cache-Oblivious Query Processing
We propose a radical approach to relational query processing that aims at automatically and consistently achieving a good performance on any memory hierarchy. We believe this auto...
Bingsheng He, Qiong Luo
161
Voted
KDD
2012
ACM
243views Data Mining» more  KDD 2012»
13 years 5 months ago
Storytelling in entity networks to support intelligence analysts
Intelligence analysts grapple with many challenges, chief among them is the need for software support in storytelling, i.e., automatically ‘connecting the dots’ between dispar...
M. Shahriar Hossain, Patrick Butler, Arnold P. Boe...
103
Voted
CCS
2007
ACM
15 years 8 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
ACSAC
2002
IEEE
15 years 7 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...