Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
— In this position paper, we motivate the need for streaming data integration in three main forms including across multiple streaming data sources, over multiple stream processin...
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Information retrieval or search plays an important role in a wide range of information management and electronic commerce tasks. In spite of the importance of information retrieva...
Nicholas J. Belkin, Susan T. Dumais, Jean Scholtz,...
Provenance in the context of workflows, both for the data they derive and for their specification, is an essential component to allow for result reproducibility, sharing, and know...