Sciweavers

295 search results - page 57 / 59
» Time-Stamp Management and Query Execution in Data Stream Man...
Sort
View
XMLSEC
2003
ACM
14 years 22 days ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
CIKM
2009
Springer
14 years 2 months ago
Maximal metric margin partitioning for similarity search indexes
We propose a partitioning scheme for similarity search indexes that is called Maximal Metric Margin Partitioning (MMMP). MMMP divides the data on the basis of its distribution pat...
Hisashi Kurasawa, Daiji Fukagawa, Atsuhiro Takasu,...
NETWORKING
2007
13 years 9 months ago
On-Line Predictive Load Shedding for Network Monitoring
Building robust network monitoring applications is hard given the unpredictable nature of network traffic. Complex analysis on streaming network data usually leads to overload situ...
Pere Barlet-Ros, Diego Amores-López, Gianlu...
SIGMOD
2010
ACM
186views Database» more  SIGMOD 2010»
14 years 9 days ago
Fast approximate correlation for massive time-series data
We consider the problem of computing all-pair correlations in a warehouse containing a large number (e.g., tens of thousands) of time-series (or, signals). The problem arises in a...
Abdullah Mueen, Suman Nath, Jie Liu
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 1 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo