Sciweavers

10210 search results - page 319 / 2042
» Configuring Database Systems
Sort
View
144
Voted
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
16 years 4 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
SIGCSE
2002
ACM
146views Education» more  SIGCSE 2002»
15 years 3 months ago
JDBC demonstration courseware using Servlets and Java Server Pages
This paper describes the design and functionality of courseware developed to demonstrate the JDBC API. The coursewarc is used in an advanced undergraduate database course that emp...
Suzanne W. Dietrich, Susan Darling Urban, Ion Kyri...
145
Voted
SEMWEB
2009
Springer
15 years 10 months ago
A Database Backend for OWL
Abstract. Most Semantic Web applications are build on top of technology based on the Semantic Web layer cake and the W3C ontology languages RDF(S) and OWL. However RDF(S) embodies ...
Jörg Henss, Joachim Kleb, Stephan Grimm
106
Voted
KSEM
2007
Springer
15 years 9 months ago
Service-Mining Based on Knowledge and Customer Databases
– This paper addresses a service-mining technique and applies this technique to improve the services of vehicle service centers. We propose a service-mining system and its data s...
Yan Li, Peng Wen, Hu Wang, Chunqiang Gong
COLING
2008
15 years 5 months ago
A Linguistic Knowledge Discovery Tool: Very Large Ngram Database Search with Arbitrary Wildcards
In this paper, we will describe a search tool for a huge set of ngrams. The tool supports queries with an arbitrary number of wildcards. It takes a fraction of a second for a sear...
Satoshi Sekine