Sciweavers

2386 search results - page 211 / 478
» Database Security 2000
Sort
View
PERCOM
2005
ACM
15 years 10 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
ICDE
2002
IEEE
104views Database» more  ICDE 2002»
16 years 2 days ago
Efficient Evaluation of Queries with Mining Predicates
Modern relational database systems are beginning to support ad hoc queries on mining models. In this paper, we explore novel techniques for optimizing queries that apply mining mo...
Surajit Chaudhuri, Vivek R. Narasayya, Sunita Sara...
VLDB
2001
ACM
138views Database» more  VLDB 2001»
15 years 3 months ago
Operating System Extensions for the Teradata Parallel VLDB
This paper describes the new architecture for supporting the Teradata commercial VLDB on several new operating environments. We start with an overview of the Teradata database sof...
John Catozzi, Sorana Rabinovici
SIGMOD
2000
ACM
121views Database» more  SIGMOD 2000»
15 years 3 months ago
TIP: A Temporal Extension to Informix
Commercial relational database systems today provide only limited temporal support. To address the needs of applications requiring rich temporal data and queries, we have built TI...
Jun Yang 0001, Huacheng C. Ying, Jennifer Widom
ADL
2000
Springer
252views Digital Library» more  ADL 2000»
15 years 3 months ago
Audio Structuring and Personalized Retrieval Using Ontologies
The goal of this work is to improve the accuracy (precision and recall) and communication effectiveness of a database system response to a user information request, by utilizing a...
Latifur Khan, Dennis McLeod