Sciweavers

1992 search results - page 93 / 399
» Implementing sorting in database systems
Sort
View
205
Voted
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
16 years 2 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
DEXA
2005
Springer
112views Database» more  DEXA 2005»
15 years 6 months ago
Distribution Rules for Array Database Queries
Abstract. Non-trivial retrieval applications involve complex computations on large multi-dimensional datasets. These should, in principle, benefit from the use of relational datab...
Alex van Ballegooij, Roberto Cornacchia, Arjen P. ...
105
Voted
PLDI
2005
ACM
15 years 6 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
NDSS
2009
IEEE
15 years 7 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
117
Voted
RSKT
2007
Springer
15 years 6 months ago
ROSA: An Algebra for Rough Spatial Objects in Databases
Abstract. A fundamental data modeling problem in geographical information systems and spatial database systems refers to an appropriate treatment of the vagueness or indeterminacy ...
Markus Schneider, Alejandro Pauly