Sciweavers

889 search results - page 58 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
SIGMOD
2003
ACM
129views Database» more  SIGMOD 2003»
15 years 9 months ago
Efficient Processing of Joins on Set-valued Attributes
Object-oriented and object-relational DBMS support setvalued attributes, which are a natural and concise way to model complex information. However, there has been limited research...
Nikos Mamoulis
VLDB
2005
ACM
139views Database» more  VLDB 2005»
15 years 3 months ago
Tree-Pattern Queries on a Lightweight XML Processor
Popular XML languages, like XPath, use “treepattern” queries to select nodes based on their structural characteristics. While many processing methods have already been propose...
Mirella Moura Moro, Zografoula Vagena, Vassilis J....
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
15 years 11 months ago
Spatial Outsourcing for Location-based Services
- The embedding of positioning capabilities in mobile devices and the emergence of location-based applications have created novel opportunities for utilizing several types of multi...
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...
IJMI
2007
140views more  IJMI 2007»
14 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
ICIP
2005
IEEE
15 years 11 months ago
Content-based video copy detection in large databases: a local fingerprints statistical similarity search approach
Recent methods based on interest points and local fingerprints have been proposed to perform robust CBCD (content-based copy detection) of images and video. They include two steps...
Alexis Joly, Carl Frélicot, Olivier Buisson