Sciweavers

639 search results - page 122 / 128
» Replication Control for Distributed Real-Time Database Syste...
Sort
View
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
15 years 7 days ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
ICDE
2005
IEEE
95views Database» more  ICDE 2005»
15 years 7 days ago
SemCast: Semantic Multicast for Content-based Data Dissemination
We address the problem of content-based dissemination of highly-distributed, high-volume data streams for stream-based monitoring applications and large-scale data delivery. Exist...
Olga Papaemmanouil, Ugur Çetintemel
VLDB
2001
ACM
126views Database» more  VLDB 2001»
14 years 11 months ago
XML-enabled workflow management for e-services across heterogeneous platforms
Advanced e-services require efficient, flexible, and easy-to-use workflow technology that integrates well with mainstream Internet technologies like XML and Web servers. This pape...
German Shegalov, Michael Gillmann, Gerhard Weikum
SIGMOD
2003
ACM
140views Database» more  SIGMOD 2003»
14 years 11 months ago
The Design of an Acquisitional Query Processor For Sensor Networks
We discuss the design of an acquisitional query processor for data collection in sensor networks. Acquisitional issues are those that pertain to where, when, and how often data is...
Samuel Madden, Michael J. Franklin, Joseph M. Hell...
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 3 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...