Sciweavers

1364 search results - page 134 / 273
» Data Level Inference Detection in Database Systems
Sort
View
107
Voted
DRM
2003
Springer
15 years 6 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
WCET
2007
15 years 1 months ago
Finding DU-Paths for Testing of Multi-Tasking Real-Time Systems using WCET Analysis
Memory corruption is one of the most common software failures. For sequential software and multitasking software with synchronized data accesses, it has been shown that program fa...
Daniel Sundmark, Anders Pettersson, Christer Sandb...
125
Voted
ICDE
2006
IEEE
134views Database» more  ICDE 2006»
15 years 6 months ago
Processing High-Volume Stream Queries on a Supercomputer
Scientific instruments, such as radio telescopes, colliders, sensor networks, and simulators generate very high volumes of data streams that scientists analyze to detect and under...
Erik Zeitler, Tore Risch
93
Voted
BMCBI
2007
135views more  BMCBI 2007»
15 years 27 days ago
DAVID Knowledgebase: a gene-centered database integrating heterogeneous gene annotation resources to facilitate high-throughput
Background: Due to the complex and distributed nature of biological research, our current biological knowledge is spread over many redundant annotation databases maintained by man...
Brad T. Sherman, Da Wei Huang, Qina Tan, Yongjian ...
121
Voted
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
15 years 4 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma