Sciweavers

2386 search results - page 148 / 478
» Database Security 2000
Sort
View
HASE
2008
IEEE
15 years 4 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
ICDT
2003
ACM
150views Database» more  ICDT 2003»
15 years 3 months ago
Bioinformatics Adventures in Database Research
Informatics has helped launch molecular biology into the genomic era. It appears certain that informatics will remain a major contributor to molecular biology in the post-genome er...
Jinyan Li, See-Kiong Ng, Limsoon Wong
ICDE
2000
IEEE
123views Database» more  ICDE 2000»
15 years 11 months ago
Assisting the Integration of Taxonomic Data: The LITCHI Toolkit
We demonstrate a prototype toolkit that uses constraints and constraint violation repair techniques to enable the automated detection and, where possible, the automated resolution...
Iain Sutherland, John S. Robinson, Sue M. Brandt, ...
IDEAS
2000
IEEE
91views Database» more  IDEAS 2000»
15 years 2 months ago
Algorithms for Cartogram Animation
We describe several value-by-area cartogram animation algorithms that can be used to visualize geographically distributed continuous spatiotemporal data that often occur in GIS sy...
Min Ouyang, Peter Z. Revesz
FMLDO
2000
Springer
138views Database» more  FMLDO 2000»
15 years 1 months ago
Schema Evolution and Versioning: A Logical and Computational Characterisation
In this paper a semantic approach for the specification and the management of databases with evolving schemata is introduced. It is shown how a general objectoriented model for sc...
Enrico Franconi, Fabio Grandi, Federica Mandreoli