Sciweavers

686 search results - page 133 / 138
» Query Answering in Peer-to-Peer Data Exchange Systems
Sort
View
CCS
2004
ACM
14 years 25 days ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
PKDD
2005
Springer
123views Data Mining» more  PKDD 2005»
14 years 28 days ago
A Multi-metric Index for Euclidean and Periodic Matching
In many classification and data-mining applications the user does not know a priori which distance measure is the most appropriate for the task at hand without examining the produ...
Michail Vlachos, Zografoula Vagena, Vittorio Caste...
TKDE
2010
152views more  TKDE 2010»
13 years 5 months ago
Maintaining Recursive Views of Regions and Connectivity in Networks
— The data management community has recently begun to consider declarative network routing and distributed acquisition: e.g., sensor networks that execute queries about contiguou...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 7 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
FQAS
2006
Springer
90views Database» more  FQAS 2006»
13 years 11 months ago
XML-Structured Documents: Retrievable Units and Inheritance
We consider the retrieval of XML-structured documents, and of passages from such documents, defined as elements of the XML structure. These are considered from the point of view of...
Stephen E. Robertson, Wei Lu, Andrew MacFarlane