Sciweavers

889 search results - page 19 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
15 years 9 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...
CSB
2005
IEEE
136views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Computational Method for Temporal Pattern Discovery in Biomedical Genomic Databases
With the rapid growth of biomedical research databases, opportunities for scientific inquiry have expanded quickly and led to a demand for computational methods that can extract b...
Mohammed I. Rafiq, Martin J. O'Connor, Amar K. Das
SSD
2007
Springer
176views Database» more  SSD 2007»
15 years 3 months ago
Distributed, Concurrent Range Monitoring of Spatial-Network Constrained Mobile Objects
The ability to continuously monitor the positions of mobile objects is important in many applications. While most past work has been set in Euclidean spaces, the mobile objects rel...
Hua Lu, Zhiyong Huang, Christian S. Jensen, Linhao...
CCS
2008
ACM
14 years 11 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ICDE
2011
IEEE
273views Database» more  ICDE 2011»
14 years 1 months ago
Shortcut selection in RDF databases
—An increasing amount of data produced nowadays is in RDF format. While significant work has been performed on view selection and query optimization algorithms in relational dat...
Vicky Dritsou, Panos Constantopoulos, Antonios Del...