Sciweavers

20878 search results - page 34 / 4176
» Database
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
14 years 11 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
VLDB
2000
ACM
149views Database» more  VLDB 2000»
15 years 1 months ago
Rethinking Database System Architecture: Towards a Self-Tuning RISC-Style Database System
Database technology is one of the cornerstones for the new millennium's IT landscape. However, database systems as a unit of code packaging and deployment are at a crossroad:...
Surajit Chaudhuri, Gerhard Weikum
ICDE
2006
IEEE
134views Database» more  ICDE 2006»
15 years 11 months ago
Inferring a Serialization Order for Distributed Transactions
Data partitioning is often used to scale-up a database system. In a centralized database system, the serialization order of commited update transactions can be inferred from the d...
Khuzaima Daudjee, Kenneth Salem
ISMIS
2005
Springer
15 years 3 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
69
Voted
IADIS
2008
14 years 11 months ago
Customer Insights from Transactional Database: Database Marketing Case
Marketing databases are currently one of the most important resources in any marketing departments. Regarding their customer knowledge needs many of them had develop their own dat...
Filipe Mota Pinto, Alzira Ascensão Marques,...