Sciweavers

24529 search results - page 427 / 4906
» Computing on Authenticated Data
Sort
View
120
Voted
VLDB
2002
ACM
165views Database» more  VLDB 2002»
15 years 4 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
16 years 5 months ago
UbiData: Requirements and Architecture for Ubiquitous Data Access
Mobile users today demand ubiquitous access to their data from any mobile device and under variable connection quality. We refer to this requirement as any-time, any-where data ac...
Abdelsalam Helal, Joachim Hammer
POLICY
2007
Springer
15 years 11 months ago
Data-Purpose Algebra: Modeling Data Usage Policies
Data is often encumbered by restrictions on the ways in which it may be used. These restrictions on usage may be determined by statute, by contract, by custom, or by common decenc...
Chris Hanson, Tim Berners-Lee, Lalana Kagal, Geral...
MIDDLEWARE
2004
Springer
15 years 10 months ago
Data pipelines: enabling large scale multi-protocol data transfers
Collaborating users need to move terabytes of data among their sites, often involving multiple protocols. This process is very fragile and involves considerable human involvement ...
Tevfik Kosar, George Kola, Miron Livny
SIGKDD
2000
237views more  SIGKDD 2000»
15 years 4 months ago
The UCI KDD Archive of Large Data Sets for Data Mining Research and Experimentation
Advances in data collection and storage have allowed organizations to create massive, complex and heterogeneous databases, which have stymied traditional methods of data analysis....
Stephen D. Bay, Dennis F. Kibler, Michael J. Pazza...