Sciweavers

1830 search results - page 293 / 366
» Implementing a Tamper-Evident Database System
Sort
View
104
Voted
ER
2004
Springer
93views Database» more  ER 2004»
15 years 6 months ago
Schema Versioning in Data Warehouses
Abstract. As several mature implementations of data warehousing systems are fully operational, a crucial role in preserving their up-to-dateness is played by the ability to manage ...
Matteo Golfarelli, Jens Lechtenbörger, Stefan...
PKDD
2004
Springer
141views Data Mining» more  PKDD 2004»
15 years 6 months ago
Spatial Associative Classification at Different Levels of Granularity: A Probabilistic Approach
In this paper we propose a novel spatial associative classifier method based on a multi-relational approach that takes spatial relations into account. Classification is driven by s...
Michelangelo Ceci, Annalisa Appice, Donato Malerba
IPPS
2003
IEEE
15 years 6 months ago
Performance Modeling of the Grace Hash Join on Cluster Architectures
Aim of the paper is to develop a concise but comprehensive analytical model for the well-known Grace Hash Join algorithm on cost effective cluster architectures. This approach is ...
Erich Schikuta
DBISP2P
2003
Springer
113views Database» more  DBISP2P 2003»
15 years 5 months ago
Structuring Peer-to-Peer Networks Using Interest-Based Communities
Abstract. Interest-based communities are a natural arrangement of distributed systems that prune the search space and allow for better dissemination of information to participating...
Mujtaba Khambatti, Kyung Dong Ryu, Partha Dasgupta
ACSAC
2002
IEEE
15 years 5 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...