Sciweavers

1830 search results - page 270 / 366
» Implementing a Tamper-Evident Database System
Sort
View
128
Voted
EDBT
2008
ACM
123views Database» more  EDBT 2008»
16 years 26 days ago
XML data integration in SixP2P: a theoretical framework
In the paper we discuss the problem of data integration in a P2P environment. In such setting each peer stores schema of its local data, mappings between the schema and schemas of...
Tadeusz Pankowski
ICDE
2010
IEEE
231views Database» more  ICDE 2010»
15 years 7 months ago
Estimating the progress of MapReduce pipelines
Abstract— In parallel query-processing environments, accurate, time-oriented progress indicators could provide much utility given that inter- and intra-query execution times can ...
Kristi Morton, Abram Friesen, Magdalena Balazinska...
IPSN
2009
Springer
15 years 7 months ago
Automating rendezvous and proxy selection in sensornets
As the diversity of sensornet use cases increases, the combinations of environments and applications that will coexist will make custom engineering increasingly impractical. We in...
David Chu, Joseph M. Hellerstein
102
Voted
PET
2009
Springer
15 years 7 months ago
Privacy-Preserving Face Recognition
Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 7 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...