Sciweavers

243 search results - page 42 / 49
» A function-based access control model for XML databases
Sort
View
ACSW
2003
14 years 11 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
BTW
2007
Springer
236views Database» more  BTW 2007»
15 years 1 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
15 years 11 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi
ICDE
2006
IEEE
146views Database» more  ICDE 2006»
15 years 11 months ago
Query Selection Techniques for Efficient Crawling of Structured Web Sources
The high quality, structured data from Web structured sources is invaluable for many applications. Hidden Web databases are not directly crawlable by Web search engines and are on...
Ping Wu, Ji-Rong Wen, Huan Liu, Wei-Ying Ma
92
Voted
ICIP
2007
IEEE
15 years 3 months ago
Face Recognition using a Fast Model Synthesis from a Profile and a Frontal View
In our previous work we presented a new 2D-3D mixed face recognition scheme called Partial Principal Component Analysis (P2 CA) [1]. The main contribution of P2 CA is that it uses...
Antonio Rama, Francesc Tarres