Sciweavers

10210 search results - page 515 / 2042
» Configuring Database Systems
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 6 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
162
Voted
DEBU
2006
163views more  DEBU 2006»
15 years 4 months ago
Towards Activity Databases: Using Sensors and Statistical Models to Summarize People's Lives
Automated reasoning about human behavior is a central goal of artificial intelligence. In order to engage and intervene in a meaningful way, an intelligent system must be able to ...
Tanzeem Choudhury, Matthai Philipose, Danny Wyatt,...
JCISE
2002
129views more  JCISE 2002»
15 years 4 months ago
Modeling Information Needs in Engineering Databases Using Tacit Knowledge
Online resources of engineering design information are a critical resource for practicing engineers. These online resources often contain references and content associated with te...
Shuang Song, Andy Dong, Alice M. Agogino
PVLDB
2010
174views more  PVLDB 2010»
15 years 3 months ago
x-RDF-3X: Fast Querying, High Update Rates, and Consistency for RDF Databases
The RDF data model is gaining importance for applications in computational biology, knowledge sharing, and social communities. Recent work on RDF engines has focused on scalable p...
Thomas Neumann, Gerhard Weikum
PVLDB
2010
117views more  PVLDB 2010»
15 years 3 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...