Sciweavers

2063 search results - page 338 / 413
» Containment of Aggregate Queries
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 2 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
CIKM
2000
Springer
15 years 2 months ago
The Webspace Method: On the Integration of Database Technology with Multimedia Retrieval
Large collections of documents containing various types of multimedia, are made available to the WWW. Unfortunately, due to the un-structuredness of Internet environments it is ha...
Roelof van Zwol, Peter M. G. Apers
KDD
1998
ACM
140views Data Mining» more  KDD 1998»
15 years 2 months ago
Blurring the Distinction between Command and Data in Scientific KDD
We have been working on two different KDD systems for scientific data. One system involves comparative genomics, where the database contains more than 60,000 plant gene and protei...
John V. Carlis, Elizabeth Shoop, Scott Krieger
VLDB
1997
ACM
104views Database» more  VLDB 1997»
15 years 2 months ago
Multiple-View Self-Maintenance in Data Warehousing Environments
A data warehouse materializes views derived from data that may not reside at the warehouse. Maintaining these views e ciently in response to base updates is di cult, since it may ...
Nam Huyn
CONCUR
2006
Springer
15 years 1 months ago
Sanity Checks in Formal Verification
One of the advantages of temporal-logic model-checking tools is their ability to accompany a negative answer to the correctness query by a counterexample to the satisfaction of the...
Orna Kupferman