Sciweavers

574 search results - page 81 / 115
» Responsive Security for Stored Data
Sort
View
ICDE
1998
IEEE
103views Database» more  ICDE 1998»
14 years 9 months ago
Online Generation of Association Rules
We have a large database consisting of sales transactions. We investigate the problem of online mining of association rules in this large database. We show how to preprocess the d...
Charu C. Aggarwal, Philip S. Yu
ICARIS
2007
Springer
14 years 1 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
IFL
2003
Springer
167views Formal Methods» more  IFL 2003»
14 years 24 days ago
A Functional Shell That Dynamically Combines Compiled Code
Abstract. We present a new shell that provides the full basic functionality of a strongly typed lazy functional language, including overloading. The shell can be used for manipulat...
Arjen van Weelden, Rinus Plasmeijer
SSDBM
2000
IEEE
86views Database» more  SSDBM 2000»
13 years 12 months ago
Serving Datacube Tuples from Main Memory
Existing datacube precompuatation schemes materialize selected datacube tuples on disk, choosing the most beneficial cuboids (i.e., combinations of dimensions) to materialize giv...
Kenneth A. Ross, Kazi A. Zaman
IFIP
1998
Springer
13 years 12 months ago
On the architecture of software component systems
Current object-oriented development practice is centered around application frameworks. In this paper, we argue that this approach is misleading, as it distracts from the ultimate...
M. Franz