Sciweavers

2853 search results - page 516 / 571
» On the Efficiency of Provenance Queries
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 1 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
IADIS
2008
15 years 1 months ago
Mining Postal Addresses
This paper presents FuMaS (Fuzzy Matching System), a system capable of an efficient retrieval of postal addresses from noisy queries. The fuzzy postal addresses retrieval has many...
José Carlos Cortizo, José Marí...
LREC
2008
90views Education» more  LREC 2008»
15 years 1 months ago
Navigating through Dense Annotation Spaces
Pattern matching, or querying, over annotations is a general purpose paradigm for inspecting, navigating, mining, and transforming annotation repositories--the common representati...
Branimir Boguraev, Mary S. Neff
CIC
2006
184views Communications» more  CIC 2006»
15 years 1 months ago
A Data Replication Scheme based on Primary Copy for Ensuring Data Consistency in Mobile Ad hoc Networks
Abstract - A mobile ad hoc network (MANET) is a multihop wireless network capable of autonomous operations. Since MANET causes frequent network partitions, a data replication is co...
Aekyung Moon, Han Namgoong, Hyoungsun Kim, Hyun Ki...
CSREASAM
2006
15 years 1 months ago
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures
- A vast majority of medical information systems use Standard Query Language databases (SQL) as the underlying technology to deliver medical records in a timely and efficient manne...
Craig Valli