68 Hits in 10.5 sec

An overview of data warehousing and OLAP technology

Surajit Chaudhuri, Umeshwar Dayal
1997 SIGMOD record  
for efficient query processing; and tools for metadata management and for managing the warehouse.  ...  We describe back end tools for extracting, cleaning and loading data into a data warehouse; multidimensional data models typical of OLAP; front end client tools for querying and data analysis; server extensions  ...  Acknowledgement We thank Goetz Graefe for his comments on the draft.  ... 
doi:10.1145/248603.248616 fatcat:ssiegmooy5bujdawwxoseke2my

On the applications of multimedia processing to communications

R.V. Cox, B.G. Haskell, Y. LeCun, B. Shahraray, L. Rabiner
1998 Proceedings of the IEEE  
-65 ms for high-quality compression algorithms);  ...  With the emergence of the multimedia PC and its concomitant signal-processing capability, a simple solution was proposed, namely, the compression (and decompression) and coding (and decoding) of voice  ...  ACKNOWLEDGMENT The authors wish to acknowledge that the original work described in this paper was done by a number of individuals at AT&T Laboratories as well as outside of AT&T.  ... 
doi:10.1109/5.664272 fatcat:yhn4kb3mmbctbbfus7br26oox4

Modeling and Multiple Perceptions [chapter]

Christine Parent, Stefano Spaccapietra, Esteban Zimányi
2017 Encyclopedia of GIS  
Modeling with Pictogrammic Languages OGC's Open Standards for Geospatial Interoperability Vector Data Cross-References Indexing, Query and Velocity-Constrained Privacy Threats in Location-Based Services  ...  processes and for contributing to our research.  ...  These cores are connected through a high-speed bidirectional, 1024-bit-wide ring bus (512 bits in each direction).  ... 
doi:10.1007/978-3-319-17885-1_805 fatcat:d4t4ossygvcutpfabqn6f3hjcm

Data-Intensive Text Processing with MapReduce

Jimmy Lin, Chris Dyer
2010 Synthesis Lectures on Human Language Technologies  
This reduces the number of servers that need to be contacted for a user query.  ...  of high-end servers-the small performance gap is insufficient to justify the price premium of the high-end servers.  ...  [37] presented general formulations of a variety of machine learning problems, focusing on a normal form for expressing a variety of machine learning algorithms in MapReduce.  ... 
doi:10.2200/s00274ed1v01y201006hlt007 fatcat:daso2mcdvrg6jev3vbospnsvpe

From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting [chapter]

Sven Laur, Riivo Talviste, Jan Willemson
2013 Lecture Notes in Computer Science  
In brief, we can emulate trusted hardware encryption in the cloud by sharing a secret key among several servers. Preliminaries AES.  ...  Note that various database operations are particularly important in privacypreserving data processing.  ...  Also, we would like to thank Helger Lipmaa for insightful theoretical suggestions.  ... 
doi:10.1007/978-3-642-38980-1_6 fatcat:sih2pvrdybarzgv3kbs2guyxg4

Data Service Outsourcing and Privacy Protection in Mobile Internet [chapter]

Zhen Qin, Erqiang Zhou, Yi Ding, Yang Zhao, Fuhu Deng, Hu Xiong
2018 Data Service Outsourcing and Privacy Protection in Mobile Internet  
On the one hand, it needs efficient data processing model to provide support for data services, and on the other hand, it needs certain computing resources to provide data security services.  ...  This monograph focuses on key technologies of data service outsourcing and privacy protection in mobile Internet, including the existing methods of data analysis and processing, the fine-grained data access  ...  In some situations, decompression speed is more important than compression speed.  ... 
doi:10.5772/intechopen.79903 fatcat:kvdisoudirgdhd7tvscnhsb6gm

Citation analysis of database publications

Erhard Rahm, Andreas Thor
2005 SIGMOD record  
Jayavel's research interests include Internet data management, IR, and query processing in emerging system architectures.  ...  Earlier affiliations include the University of the Saarland in Germany, ETH Zurich in Switzerland, MCC in Austin, Texas, and, during a sabbatical, Microsoft Research in Redmond, Washington.  ...  A query for the cities and states of all California employees can be written as://employee[address/state='CA']/address/concat(city, ', ', state) rather than:for $a in //employee[address/state="CA"] /address  ... 
doi:10.1145/1107499.1107505 fatcat:c4evhhw6y5difggghxsvvdqzeu

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely  ...  and software assurance. of maturity to warrant a comprehensive textbook treatment. ideas for books under this series.  ...  Sixth Framework Programme -in the framework of the NETQOS project (details can be seen at  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm

Download Complete Issue: 37 (20MB)

Complete Issue
2000 Cartographic Perspectives  
ACKNOWLEDGEMENTS REFERENCES NOTES Atlas of Cancer Mortality in the United States, 1950-94.  ...  In the first example, AXIOMAP works as a user front-end on top of server software that generates XML files in the process of responding to user queries.  ...  For example, the site of the Dutch High-Speed Line Project (URL 12) contains maps showing the routes of the railway line.  ... 
doi:10.14714/cp37.800 fatcat:3asajujmkja6jcbfyybxahm5gq

Physical One-Way Functions

R. Pappu
2002 Science  
This dissertation introduces physical one-way functions and physical one-way hash functions as primitives for physical analogs of cryptosystems.  ...  I want to thank Neil Gershenfeld, my thesis advisor, for his vision, energy, enthusiasm, and  ...  ACKNOWLEDGEMENTS 9 Acknowledgements Many extraordinary people contributed to this work in extraordinary ways.  ... 
doi:10.1126/science.1074376 pmid:12242435 fatcat:okqvbdehhrga7pf53yl5uvqqcy

Models, Algorithms, and Architectures for Scalable Packet Classification

David Edward Taylor
, and a new packet classification algorithm that scales to support high-speed Campus Box 1045 -St.  ...  , and a new packet classification algorithm that scales to support high-speed links and large filter sets classifying on additional packet fields.  ...  In order to speed up the lookup process, multi-bit trie schemes were developed which perform a search using multiple bits of the address at a time.  ... 
doi:10.7936/k7fq9tzd fatcat:tb5dig4btzckxmd6veqdqi3vx4

Guidelines for Ethical Nudging in Password Authentication

Karen Renaud, Verena Zimmermann
2018 SAIEE Africa Research Journal  
The authors acknowledge that opinions, findings and conclusions or recommendations expressed here are those of the author(s) and that none of the above mentioned sponsors accept liability whatsoever in  ...  Redis supports high-level, atomic, server-side operations like appending to a string, incrementing the value in a hash, pushing an element to a list, computing set intersection, union and difference and  ...  For example resource-efficient key-value stores are often applied in embedded systems or as high performance in-process databases.  ... 
doi:10.23919/saiee.2018.8531951 fatcat:jhjrqjjyrbe6vcp27qfvvl5lvq

Engineering, Technology & Applied Science Research (ETASR), Vol. 11, No. 3, pp. 7069-7290

2021 Zenodo  
), and has been awarded a DOAJ seal.  ...  ETASR is indexed in the Web of Science Core Collection (former Web of Science/Thomson Reuters Master Journal List), through the Emerging Sources Citation Index, is a Crossref member (DOI prefix: 10.48084  ...  We also thank the NED University of Engineering and Technology for providing us the platform to carry out this work. ACKNOWLEDGMENT The work presented in this paper was supported by  ... 
doi:10.5281/zenodo.5136285 fatcat:2beknqdb3bcq7fqfav6btil6ci

Functional Representation of Prototypes in LVQ and Relevance Learning [chapter]

Friedrich Melchert, Udo Seiffert, Michael Biehl
2016 Advances in Intelligent Systems and Computing  
The overall acceptance rate was 88% (63% for regular papers, 100% for compressed contributions and demonstration abstracts, and 91% for thesis abstracts).  ...  As in previous years, BNAIC 2016 welcomed four types of contributions, namely A) regular papers, B) compressed contributions, C) demonstration abstracts, and D) thesis abstracts.  ...  Acknowledgements The Tesla K40 used for this research was donated by the NVIDIA Corporation. The thesis was supervised by Frans A. Oliehoek.  ... 
doi:10.1007/978-3-319-28518-4_28 fatcat:uwxvq6txmrba3ajulmblafgh2a

Access controlled: the shaping of power, rights, and rule in cyberspace

2010 ChoiceReviews  
In Ukraine, DSL is used by ISPs as high-speed leased lines.  ...  As a result, the police arrested 17 young drivers for speeding.  ...  in, [143] [144] ISPs in, 140  ... 
doi:10.5860/choice.48-2125 fatcat:pnspoirndfenlhq3urwsqomh2m
« Previous Showing results 1 — 15 out of 68 results