Sciweavers

Share
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
8 years 10 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
8 years 10 months ago
Augmenting spatio-textual search with an infectious disease ontology
— A system is described that automatically categorizes and classifies infectious disease incidence reports by type and geographic location, to aid analysis by domain experts. It...
Michael D. Lieberman, Jagan Sankaranarayanan, Hana...
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
8 years 10 months ago
Recall-based cluster reformulation by selfish peers
Georgia Koloniari, Evaggelia Pitoura
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
8 years 10 months ago
Database systems on virtual machines: How much do you lose?
Virtual machine technologies offer simple and practical mechanisms to address many manageability problems in database systems. For example, these technologies allow for server con...
Umar Farooq Minhas, Jitendra Yadav, Ashraf Aboulna...
ICDE
2008
IEEE
130views Database» more  ICDE 2008»
8 years 10 months ago
SARD: A statistical approach for ranking database tuning parameters
Biplob K. Debnath, David J. Lilja, Mohamed F. Mokb...
ICDE
2008
IEEE
164views Database» more  ICDE 2008»
8 years 10 months ago
Modelling traceability in the forestry wood supply chain
—Equivalent of €5 billion of wood raw material is going to waste in Europe. The reason is that information regarding the raw material is not available throughout the system. An...
Antti Sirkka
ICDE
2008
IEEE
113views Database» more  ICDE 2008»
8 years 10 months ago
A rank-rewrite framework for summarizing XML documents
Abstract— With XML becoming a standard for data representation and exchange, we can expect to see large scale repositories and warehouses of XML data. In order for users to under...
Maya Ramanath, Kondreddi Sarath Kumar
ICDE
2008
IEEE
165views Database» more  ICDE 2008»
8 years 10 months ago
Semantic Web and firewall alignment
— Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach...
Simon N. Foley, William M. Fitzgerald
ICDE
2008
IEEE
106views Database» more  ICDE 2008»
8 years 10 months ago
DIPBench: An independent benchmark for Data-Intensive Integration Processes
— The integration of heterogeneous data sources is one of the main challenges within the area of data engineering. Due to the absence of an independent and universal benchmark fo...
Matthias Böhm, Dirk Habich, Wolfgang Lehner, ...
books