—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
The problem of reducing an algebraic Riccati equation XCX − AX − XD + B = 0 to a unilateral quadratic matrix equation (UQME) of the kind PX2 + QX + R = 0 is analyzed. New redu...
Dario Andrea Bini, Beatrice Meini, Federico Poloni
In this paper, we investigate the benefits and challenges of integrating history into a near-real-time monitoring system; and present a general purpose continuous monitoring engi...
Database indices provide a non-discriminative navigational infrastructure to localize tuples of interest. Their maintenance cost is taken during database updates. In this paper, w...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
Many decades of work have been invested in the area of distributed transactions including protocols such as 2PC, Paxos, and various approaches to quorum. These protocols provide t...
In this paper, we propose an approach that provides the benefits of isolation in service-oriented applications where it is not feasible to use the traditional locking mechanisms u...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...