Sciweavers

101 search results - page 3 / 21
» Using queries for distributed monitoring and forensics
Sort
View
SIGMOD
2003
ACM
209views Database» more  SIGMOD 2003»
14 years 7 months ago
Distributed Top-K Monitoring
The querying and analysis of data streams has been a topic of much recent interest, motivated by applications from the fields of networking, web usage analysis, sensor instrumenta...
Brian Babcock, Chris Olston
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 1 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
CIKM
2010
Springer
13 years 5 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
TKDE
2012
487views Formal Methods» more  TKDE 2012»
11 years 9 months ago
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
—Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of som...
Rajeev Gupta, Krithi Ramamritham
ICDE
2008
IEEE
209views Database» more  ICDE 2008»
14 years 8 months ago
Distributed Monitoring of Peer-to-Peer Systems
In this paper, we are concerned with the distributed monitoring of P2P systems. We introduce the P2P Monitor system and a new declarative language, namely P2PML, for specifying mo...
Serge Abiteboul, Bogdan Marinoiu, Pierre Bourhis