Sciweavers

2237 search results - page 369 / 448
» Storing information with extractors
Sort
View
DNIS
2010
Springer
177views Database» more  DNIS 2010»
14 years 5 months ago
Managing Dynamic Mixed Workloads for Operational Business Intelligence
Abstract. As data warehousing technology gains a ubiquitous presence in business today, companies are becoming increasingly reliant upon the information contained in their data war...
Harumi A. Kuno, Umeshwar Dayal, Janet L. Wiener, K...
APLAS
2009
ACM
14 years 5 months ago
Scalable Context-Sensitive Points-to Analysis Using Multi-dimensional Bloom Filters
Abstract. Context-sensitive points-to analysis is critical for several program optimizations. However, as the number of contexts grows exponentially, storage requirements for the a...
Rupesh Nasre, Kaushik Rajan, Ramaswamy Govindaraja...
INFOSCALE
2009
ACM
14 years 5 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
EIT
2008
IEEE
14 years 5 months ago
Architectural support for securing application data in embedded systems
—The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the sy...
Olga Gelbart, Eugen Leontie, Bhagirath Narahari, R...
IRI
2008
IEEE
14 years 5 months ago
Computation with imprecise probabilities
abstract An imprecise probability distribution is an instance of second-order uncertainty, that is, uncertainty about uncertainty, or uncertainty for short. Another instance is an ...
Lotfi A. Zadeh