Sciweavers

268 search results - page 48 / 54
» icde 2007
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 1 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 1 months ago
Outlier Detection for Fine-grained Load Balancing in Database Clusters
Recent industry trends towards reducing the costs of ownership in large data centers emphasize the need for database system techniques for both automatic performance tuning and ef...
Jin Chen, Gokul Soundararajan, Madalin Mihailescu,...
ICDE
2007
IEEE
161views Database» more  ICDE 2007»
14 years 1 months ago
How to scalably and accurately skip past streams
Data stream methods look at each new item of the stream, perform a small number of operations while keeping a small amount of memory, and still perform muchneeded analyses. Howeve...
Supratik Bhattacharyya, André Madeira, S. M...
ICDE
2007
IEEE
185views Database» more  ICDE 2007»
14 years 8 months ago
On k-Nearest Neighbor Searching in Non-Ordered Discrete Data Spaces
A k-nearest neighbor (k-NN) query retrieves k objects from a database that are considered to be the closest to a given query point. Numerous techniques have been proposed in the p...
Dashiell Kolbe, Qiang Zhu, Sakti Pramanik
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
14 years 8 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik