Sciweavers

4616 search results - page 126 / 924
» Beyond relational databases
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 6 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
ISMIS
2005
Springer
15 years 10 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
154
Voted
FUIN
2007
147views more  FUIN 2007»
15 years 5 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
162
Voted
AMAI
2007
Springer
15 years 5 months ago
Database querying under changing preferences
We present here a formal foundation for an iterative and incremental approach to constructing and evaluating preference queries. Our main focus is query modification: a query tran...
Jan Chomicki
ER
2006
Springer
158views Database» more  ER 2006»
15 years 8 months ago
Database to Semantic Web Mapping Using RDF Query Languages
One of the main drawbacks of the Semantic Web is the lack of semantically rich data, since most of the information is still stored in relational databases. In this paper, we presen...
Cristian Pérez de Laborda, Stefan Conrad