Sciweavers

889 search results - page 86 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
ICDE
2010
IEEE
244views Database» more  ICDE 2010»
15 years 9 months ago
Reliable Storage and Querying for Collaborative Data Sharing Systems
The sciences, business confederations, and medicine urgently need infrastructure for sharing data and updates among collaborators' constantly changing, heterogeneous databases...
Nicholas E. Taylor, Zachary G. Ives
ICDE
2006
IEEE
177views Database» more  ICDE 2006»
15 years 11 months ago
Searching Substructures with Superimposed Distance
Efficient indexing techniques have been developed for the exact and approximate substructure search in large scale graph databases. Unfortunately, the retrieval problem of structu...
Xifeng Yan, Feida Zhu, Jiawei Han, Philip S. Yu
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
15 years 10 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
BMCBI
2006
124views more  BMCBI 2006»
14 years 9 months ago
HybGFS: a hybrid method for genome-fingerprint scanning
Background: Protein identification based on mass spectrometry (MS) has previously been performed using peptide mass fingerprinting (PMF) or tandem MS (MS/MS) database searching. H...
Kosaku Shinoda, Nozomu Yachie, Takeshi Masuda, Nao...
CSFW
1998
IEEE
15 years 2 months ago
Data Level Inference Detection in Database Systems
Existing work on inference detection for database systems mainly employ functional dependencies in the database schema to detect inferences. It has been noticed that analyzing the...
Raymond W. Yip, Karl N. Levitt