Sciweavers

1398 search results - page 194 / 280
» Medical Database Security
Sort
View
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 6 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
103
Voted
MDM
2005
Springer
127views Communications» more  MDM 2005»
15 years 6 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis
99
Voted
OOPSLA
2005
Springer
15 years 6 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...
VLDB
2005
ACM
132views Database» more  VLDB 2005»
15 years 6 months ago
MIX: A Meta-data Indexing System for XML
We present a system for efficient meta-data indexed querying of XML documents. Given the diversity of the information available in XML, it is very useful to annotate XML data wit...
SungRan Cho, Nick Koudas, Divesh Srivastava
90
Voted
ITICSE
2004
ACM
15 years 6 months ago
The backwash effect on SQL skills grading
This paper examines the effect of grading approaches for SQL query formulation on students’ learning strategies. The way that students are graded in a subject has a significant ...
Julia Coleman Prior, Raymond Lister