... Witold Litwin†, Avi Pfeffer, Adam Sah, and Carl Staelin†
Computer Science Div., Dept. of EECS
University of California
Berkeley, California 947 20
Abstract
In this paper we explore query execution ... manner.
† Author’s current address: Hewlett-Packard Laboratories, M/S 1U-13, P.O. Box 1 0490 , Palo Alto, CA 943 03.
This research was sponsored by the National Science Foundation under gran...
... project started in July 1991 and will end in June 1 994.
We hope to continue with a second phase of Sequoia 2000 that will start in July
1 994. The following sections show some of our efforts that ... Plan
7
Livermore Laboratory and currently licensed to General Atomics (GA), who op-
erate the San Diego Supercomputer Center in partnership with the University of
California. There are UniTree...
... 1987), 70-95.
[KAME94] I. Kamel and C. Faloutsos, “Hilbert R-tree: An Improved R-tree Using Fractals”, CS-TR-3032 , Univ. of Maryland
Institute for Advanced Computer Studies, Dept. of Computer Science, ... 445-448.
20
[NYBE94] C. Nyberg, T. Barclay, Z. Cvetanovic, J. Gray and D. Lomet, “AlphaSort: A RISC Machine Sort”, Proc. 1 994 ACM-
SIGMOD Conf. on Management of Data, Minneapolis, MN,...
... exchange secrets. In
In Proceedings of the 27th IEEE Symposium on Foundations of Computer
Science, pages 162–167.
26 COMPUTER SECURITY IN THE 21 CENTURY
cal press. While the Agrawal/Evfimievski/Srikant ... simple — it could
simply create false entries corresponding to a set of the residents. If any of
36 COMPUTER SECURITY IN THE 21 CENTURY
those residents were on the other company’s cust...
... of computer forensics and how to
prepare for the EC-Council’s Computer Hacker Forensic Investigator exam.This chapter will
review the objectives of computer forensics. It will also discuss computer- facilitated ... the crime and the location of the evidence.
Computer investigations are conducted on two types of computers: the computer used to
commit a crime, and computer that is...