Sciweavers

2386 search results - page 71 / 478
» Database Security 2000
Sort
View
IADIS
2004
14 years 11 months ago
Physiology of mobile database: an unconventional database
As the mobility of people increases, anytime, anywhere computing has become a must. The appearance of powerful portable computers, along with advancement in wireless communication...
Imran Khan, Nasir Touheed
DEXAW
2009
IEEE
93views Database» more  DEXAW 2009»
15 years 1 months ago
The Secure Pipes and Filters Pattern
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...
Eduardo B. Fernandez, Jorge L. Ortega-Arjona
KDD
2003
ACM
210views Data Mining» more  KDD 2003»
15 years 10 months ago
Privacy-preserving k-means clustering over vertically partitioned data
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key ...
Jaideep Vaidya, Chris Clifton