Sciweavers

10210 search results - page 306 / 2042
» Configuring Database Systems
Sort
View
160
Voted
SACMAT
2006
ACM
15 years 9 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
134
Voted
EMNLP
2006
15 years 4 months ago
Learning Field Compatibilities to Extract Database Records from Unstructured Text
Named-entity recognition systems extract entities such as people, organizations, and locations from unstructured text. Rather than extract these mentions in isolation, this paper ...
Michael L. Wick, Aron Culotta, Andrew McCallum
154
Voted
TKDE
1998
163views more  TKDE 1998»
15 years 3 months ago
A Highly Effective Partition Selection Policy for Object Database Garbage Collection
—We investigate methods to improve the performance of algorithms for automatic storage reclamation of object databases. These algorithms are based on a technique called partition...
Jonathan E. Cook, Alexander L. Wolf, Benjamin G. Z...
DBA
2004
72views Database» more  DBA 2004»
15 years 4 months ago
Explicit and Implicit LIST Aggregate Function for Relational Databases
We argue for a new aggregate function we termed the LIST function. It aggregates a set of values of one or more attributes into a single value that is internally a list of these v...
Witold Litwin
120
Voted
WWW
2007
ACM
16 years 4 months ago
Consistency-preserving caching of dynamic database content
With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffective. We describe...
Niraj Tolia, M. Satyanarayanan