Sciweavers

392 search results - page 69 / 79
» Vector Processing Support for FPGA-Oriented High Performance...
Sort
View
RAID
1999
Springer
13 years 11 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
INFOCOM
2007
IEEE
14 years 1 months ago
Dynamic Cross-Layer Association in 802.11-Based Mesh Networks
—In IEEE 802.11-based wireless mesh networks a user is associated with an access point (AP) in order to communicate and be part of the overall network. The association mechanism ...
George Athanasiou, Thanasis Korakis, Özgü...
SC
2005
ACM
14 years 28 days ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
SIGMOD
2010
ACM
171views Database» more  SIGMOD 2010»
14 years 6 days ago
Variance aware optimization of parameterized queries
Parameterized queries are commonly used in database applications. In a parameterized query, the same SQL statement is potentially executed multiple times with different parameter ...
Surajit Chaudhuri, Hongrae Lee, Vivek R. Narasayya
SSD
1999
Springer
197views Database» more  SSD 1999»
13 years 11 months ago
3D Shape Histograms for Similarity Search and Classification in Spatial Databases
Classification is one of the basic tasks of data mining in modern database applications including molecular biology, astronomy, mechanical engineering, medical imaging or meteorolo...
Mihael Ankerst, Gabi Kastenmüller, Hans-Peter...