Sciweavers

1830 search results - page 298 / 366
» Implementing a Tamper-Evident Database System
Sort
View
109
Voted
SIGMOD
2010
ACM
277views Database» more  SIGMOD 2010»
15 years 5 months ago
A comparison of join algorithms for log processing in MaPreduce
The MapReduce framework is increasingly being used to analyze large volumes of data. One important type of data analysis done with MapReduce is log processing, in which a click-st...
Spyros Blanas, Jignesh M. Patel, Vuk Ercegovac, Ju...
195
Voted
GIS
2006
ACM
16 years 1 months ago
Efficient GML-native processors for web-based GIS: techniques and tools
Geography Markup Language (GML) is an XML-based language for the markup, storage, and exchange of geospatial data. It provides a rich geospatial vocabulary and allows flexible doc...
Chia-Hsin Huang, Tyng-Ruey Chuang, Dong-Po Deng, H...
CCS
2007
ACM
15 years 6 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
SAC
2004
ACM
15 years 6 months ago
Integrating similarity-based queries in image DBMSs
Until recently, issues in image retrieval have been handled in DBMSs and in computer vision as separate research works. Nowadays, the trend is towards integrating the two approach...
Solomon Atnafu, Richard Chbeir, David Coquil, Lion...
129
Voted
WWW
2003
ACM
16 years 1 months ago
Ontology-Based Image Retrieval
The binary form of an image does not tell what the image is about. It is possible to retrieve images from a database using pattern matching techniques, but usually textual descript...
Avril Styrman, Eero Hyvönen, Kim Viljanen, Sa...