Sciweavers

1457 search results - page 220 / 292
» Privacy Challenges for Database Systems
Sort
View
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
14 years 12 months ago
Universal Resource Lifecycle Management
This paper presents a model and a tool that allows Web users to define, execute, and manage lifecycles for any artifact available on the Web. In the paper we show the need for life...
Marcos Báez, Fabio Casati, Maurizio Marches...
CIDR
2007
144views Algorithms» more  CIDR 2007»
13 years 11 months ago
Cache-Oblivious Query Processing
We propose a radical approach to relational query processing that aims at automatically and consistently achieving a good performance on any memory hierarchy. We believe this auto...
Bingsheng He, Qiong Luo
KDD
2012
ACM
243views Data Mining» more  KDD 2012»
12 years 18 days ago
Storytelling in entity networks to support intelligence analysts
Intelligence analysts grapple with many challenges, chief among them is the need for software support in storytelling, i.e., automatically ‘connecting the dots’ between dispar...
M. Shahriar Hossain, Patrick Butler, Arnold P. Boe...
CCS
2007
ACM
14 years 4 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
ACSAC
2002
IEEE
14 years 3 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...