Sciweavers

2458 search results - page 54 / 492
» Database-Management Principles And Applications
Sort
View
CCS
2007
ACM
15 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
SIGIR
2004
ACM
15 years 3 months ago
Constructing a text corpus for inexact duplicate detection
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. The goal of this work i...
Jack G. Conrad, Cindy P. Schriber
DRM
2004
Springer
15 years 3 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
SIGMOD
2010
ACM
310views Database» more  SIGMOD 2010»
15 years 2 months ago
The DataPath system: a data-centric analytic processing engine for large data warehouses
Since the 1970’s, database systems have been “compute-centric”. When a computation needs the data, it requests the data, and the data are pulled through the system. We belie...
Subi Arumugam, Alin Dobra, Christopher M. Jermaine...
DGO
2006
112views Education» more  DGO 2006»
14 years 11 months ago
Matching and integration across heterogeneous data sources
A sea of undifferentiated information is forming from the body of data that is collected by people and organizations, across government, for different purposes, at different times...
Patrick Pantel, Andrew Philpot, Eduard H. Hovy