Sciweavers

5206 search results - page 952 / 1042
» The Architecture Of An Active Data Base Management System
Sort
View
CIKM
2010
Springer
13 years 9 months ago
Top-Eye: top-k evolving trajectory outlier detection
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for identifying abnormal moving activities. Indeed, various asp...
Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, J...
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
14 years 10 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
14 years 10 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
LOCA
2009
Springer
14 years 5 months ago
Error Estimation for Indoor 802.11 Location Fingerprinting
802.11-based indoor positioning systems have been under research for quite some time now. However, despite the large attention this topic has gained, most of the research focused o...
Hendrik Lemelson, Mikkel Baun Kjærgaard, Ren...
POPL
2012
ACM
12 years 6 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama