Sciweavers

424 search results - page 56 / 85
» types 1999
Sort
View
ICDE
1999
IEEE
94views Database» more  ICDE 1999»
16 years 5 months ago
Scalable Trigger Processing
Current database trigger systems have extremely limited scalability. This paper proposes a way to develop a truly scalable trigger system. Scalability to large numbers of trigger...
Eric N. Hanson, Chris Carnes, Lan Huang, Mohan Kon...
100
Voted
DAC
1999
ACM
16 years 4 months ago
Optimization-Intensive Watermarking Techniques for Decision Problems
Recently, a number of watermarking-based intellectual property protection techniques have been proposed. Although they have been applied to different stages in the design process ...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
197
Voted
SIGMOD
2009
ACM
117views Database» more  SIGMOD 2009»
16 years 4 months ago
FERRY: database-supported program execution
We demonstrate the language Ferry and its editing, compilation, and execution environment FerryDeck. Ferry's type system and operations match those of scripting or programmin...
Torsten Grust, Manuel Mayr, Jan Rittinger, Tom Sch...
219
Voted
ISICA
2009
Springer
15 years 10 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
111
Voted
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
15 years 8 months ago
Pricing strategies on the Web: evidence from the online book industry
Using data collected between August 1999 and January 2000, we examine firm-level pricing strategies for 32 online bookstores. The data cover more than 300 books, including New Yor...
Karen Clay, Ramayya Krishnan, Eric Wolff