Sciweavers

211 search results - page 24 / 43
» When to Update the sequential patterns of stream data
Sort
View
TISSEC
2008
100views more  TISSEC 2008»
13 years 7 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
INFSOF
2007
83views more  INFSOF 2007»
13 years 7 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
PVLDB
2008
107views more  PVLDB 2008»
13 years 6 months ago
Finding relevant patterns in bursty sequences
Sequence data is ubiquitous and finding frequent sequences in a large database is one of the most common problems when analyzing sequence data. Unfortunately many sources of seque...
Alexander Lachmann, Mirek Riedewald
CIKM
2008
Springer
13 years 9 months ago
Content-based filtering for efficient online materialized view maintenance
Real-time materialized view maintenance has become increasingly popular, especially in real-time data warehousing and data streaming environments. Upon updates to base relations, ...
Gang Luo, Philip S. Yu
ATAL
2008
Springer
13 years 9 months ago
Self-interested database managers playing the view maintenance game
A database view is a dynamic virtual table composed of the result set of a query, often executed over different underlying databases. The view maintenance problem concerns how a v...
Hala Mostafa, Victor R. Lesser, Gerome Miklau