Sciweavers

211 search results - page 39 / 43
» Secrecy, Group Creation
Sort
View
SIGUCCS
2000
ACM
14 years 4 days ago
On the Road to Becoming a Statewide ISP
This paper discusses the technical and policy issues that West Virginia Network (WVNET) encountered when it expanded its statewide Internet dialup service through an outsourcing p...
Roman Olynyk
VLDB
1995
ACM
112views Database» more  VLDB 1995»
14 years 3 days ago
OPOSSUM: Desk-Top Schema Management through Customizable Visualization
Several recent trends have changed the usage and users of schemas beyond those of a database administrator’s tool for describing database contents. Distribution of computing pow...
Eben M. Haber, Yannis E. Ioannidis, Miron Livny
EDBT
2010
ACM
170views Database» more  EDBT 2010»
13 years 12 months ago
Augmenting OLAP exploration with dynamic advanced analytics
Online Analytical Processing (OLAP) is a popular technique for explorative data analysis. Usually, a fixed set of dimensions (such as time, place, etc.) is used to explore and ana...
Benjamin Leonhardi, Bernhard Mitschang, Rubé...
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 10 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
ECIS
2003
13 years 10 months ago
A knowledge management application to support knowledge sharing in a design engineering community
The changing competitive landscape has brought new forces to bear on the manner in which new products are developed. These forces have put the creation and dissemination of knowle...
Brian Donnellan, Brian Fitzgerald