Sciweavers

1179 search results - page 160 / 236
» Query Containment for Data Integration Systems
Sort
View
CCS
2003
ACM
14 years 2 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
14 years 9 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...
HPDC
2010
IEEE
13 years 9 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
CVPR
2012
IEEE
11 years 11 months ago
Multi view registration for novelty/background separation
We propose a system for the automatic segmentation of novelties from the background in scenarios where multiple images of the same environment are available e.g. obtained by weara...
Omid Aghazadeh, Josephine Sullivan, Stefan Carlsso...
LNCS
1993
14 years 25 days ago
Multimedia Database Systems
– In the past few years considerable demand for user oriented multimedia information systems has developed. These systems must provide a rich set of functionality so that new, co...
Arif Ghafoor, P. Bruce Berra