Sciweavers

49 search results - page 9 / 10
» Model driven development of secure XML data warehouses: a ca...
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 6 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
NGC
2007
Springer
128views Communications» more  NGC 2007»
13 years 5 months ago
User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid
Abstract Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources...
Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang, A...
KDD
2004
ACM
171views Data Mining» more  KDD 2004»
14 years 6 months ago
Integrating Web Conceptual Modeling and Web Usage Mining
We present a case study about the application of the inductive database approach to the analysis of Web logs. We consider rich XML Web logs ? called conceptual logs ? that are gen...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Robe...
BPM
2007
Springer
258views Business» more  BPM 2007»
13 years 10 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
OOPSLA
2010
Springer
13 years 4 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...