Sciweavers

2386 search results - page 285 / 478
» Database Security 2000
Sort
View
OOPSLA
2007
Springer
15 years 9 months ago
Lost in translation: formalizing proposed extensions to c#
Current real-world software applications typically involve heavy use of relational and XML data and their query languages. Unfortunately object-oriented languages and database que...
Gavin M. Bierman, Erik Meijer, Mads Torgersen
DEXAW
2006
IEEE
165views Database» more  DEXAW 2006»
15 years 9 months ago
Design of a Web-Based Application for Wireless Sensor Networks
Wireless sensor networks (WSNs) are used for various ubiquitous and pervasive environments. A few common applications are security, agriculture, automation, and environmental moni...
Sajid Hussain, Nick Schofield, Abdul Wasey Matin
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
15 years 9 months ago
Reputation Lending for Virtual Communities
Reputation management schemes have recently emerged as a mechanism for improving trust and security in peer-topeer networks. A new entrant in a network with reputation management ...
Anurag Garg, Alberto Montresor, Roberto Battiti
MM
2006
ACM
124views Multimedia» more  MM 2006»
15 years 9 months ago
Blazingly fast image copyright enforcement
Many photo agencies use the web to sell access to their image collections. Despite significant security measures, images may be stolen and distributed, making it necessary to det...
Herwig Lejsek, Friðrik Heiðar Ásmun...
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 9 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner