Sciweavers

1403 search results - page 156 / 281
» Security Model for XML Data
Sort
View
ICDT
2010
ACM
259views Database» more  ICDT 2010»
14 years 7 months ago
Forward-XPath and extended register automata on data-trees
We consider a fragment of XPath named `forward-XPath', which contains all descendant and rightwards sibling axes as well as data equality and inequality tests. The satisfiabi...
Diego Figueira
LREC
2010
184views Education» more  LREC 2010»
13 years 11 months ago
New Features in Spoken Language Search Hawk (SpLaSH): Query Language and Query Sequence
In this work we present further development of the SpLaSH (Spoken Language Search Hawk) project. SpLaSH implements a data model for annotated speech corpora integrated with textua...
Sara Romano, Francesco Cutugno
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 10 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
WSC
2008
14 years 12 days ago
A methodology for input data management in discrete event simulation projects
Discrete event simulation (DES) projects rely heavily on high input data quality. Therefore, the input data management process is very important and, thus, consumes an extensive a...
Anders Skoogh, Björn Johansson
IMCS
2007
77views more  IMCS 2007»
13 years 10 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...