Sciweavers

2386 search results - page 170 / 478
» Database Security 2000
Sort
View
ASIAN
2000
Springer
156views Algorithms» more  ASIAN 2000»
15 years 2 months ago
Reusing Animations in Databases for Multimedia Presentations
Abstract. Multimedia presentations and their applications are becoming more and more popular in most spheres of industry and everyday life. A database approach could help in queryi...
Zhiyong Huang, Binjia Jiao, B. Prabhakaran, Conrad...
VLDB
2000
ACM
135views Database» more  VLDB 2000»
15 years 1 months ago
Telcordia's Database Reconciliation and Data Quality Analysis Tool
This demonstration illustrates how a comprehensive database reconciliation tool can provide the ability to characterize data-quality and data-reconciliation issues in complex real...
Francesco Caruso, Munir Cochinwala, Uma Ganapathy,...
LREC
2008
85views Education» more  LREC 2008»
14 years 11 months ago
Construction of a Metadata Database for Efficient Development and Use of Language Resources
The National Institute of Information and Communications Technology (NICT) and Nagoya University have been jointly constructing a large scale database named SHACHI by collecting d...
Hitomi Tohyama, Shunsuke Kozawa, Kiyotaka Uchimoto...
BDA
2000
14 years 11 months ago
Incremental Mining of Sequential Patterns in Large Databases
In this paper we consider the problem of the incremental mining of sequential patterns when new transactions or new customers are added to an original database. We present a new a...
Florent Masseglia, Pascal Poncelet, Maguelonne Tei...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 4 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo