Sciweavers

1472 search results - page 72 / 295
» Data Warehouse Configuration
Sort
View
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
15 years 11 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
ATAL
2003
Springer
15 years 1 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
AGIS
1998
169views more  AGIS 1998»
14 years 9 months ago
The Configuration and Implementation of a Hybrid 3-D GIS for Urban Data Management
With the development of modern cities, 3-D spatial information systems (SIS) are increasingly required for spatial planning, communication systems and other applications. The geom...
Xinhua Wang, Armin Gruen
ACIVS
2008
Springer
15 years 4 months ago
Adaptive Metadata Management System for Distributed Video Content Analysis
Scientific advances in the development of video processing algorithms now allow various distributed and collaborative vision-based applications. However, the lack of recognised st...
C. Carincotte, Xavier Desurmont, A. Bastide
DKE
2002
107views more  DKE 2002»
14 years 9 months ago
View selection using randomized search
An important issue in data warehouse development is the selection of a set of views to materialize in order to accelerate OLAP queries, given certain space and maintenance time co...
Panos Kalnis, Nikos Mamoulis, Dimitris Papadias