Sciweavers

2340 search results - page 139 / 468
» Data abstraction and information hiding
Sort
View
WIDM
2003
ACM
15 years 3 months ago
Answering imprecise database queries: a novel approach
A growing number of databases especially those published on the Web are becoming available to external users. Users of these databases are provided simple form-based query interfa...
Ullas Nambiar, Subbarao Kambhampati
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 10 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
15 years 11 months ago
Orchid: Integrating Schema Mapping and ETL
This paper describes Orchid, a system that converts declarative mapping specifications into data flow specifications s) and vice versa. Orchid provides an abstract operator model t...
Stefan Dessloch, Mauricio A. Hernández, Rya...
CONEXT
2006
ACM
15 years 4 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai
CCS
2011
ACM
13 years 10 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...