Sciweavers

889 search results - page 62 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
166
Voted
SIGMOD
2006
ACM
129views Database» more  SIGMOD 2006»
15 years 9 months ago
InMAF: indexing music databases via multiple acoustic features
Music information processing has become very important due to the ever-growing amount of music data from emerging applications. In this demonstration, we present a novel approach ...
Jialie Shen, John Shepherd, Anne H. H. Ngu
TES
2001
Springer
15 years 2 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
SIGMOD
1998
ACM
143views Database» more  SIGMOD 1998»
15 years 1 months ago
Interaction of Query Evaluation and Buffer Management for Information Retrieval
The proliferation of the World Wide Web has brought information retrieval (IR) techniques to the forefront of search technology. To the average computer user, “searching” now ...
Björn Þór Jónsson, Michae...
SIGMOD
1999
ACM
107views Database» more  SIGMOD 1999»
15 years 2 months ago
Client-Site Query Extensions
We explore the execution of queries with client-site userdefined functions (UDFs). Many UDFs can only be executed at the client site, for reasons of scalability, security, confide...
Tobias Mayr, Praveen Seshadri
VLDB
2010
ACM
190views Database» more  VLDB 2010»
14 years 8 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias