Sciweavers

2492 search results - page 137 / 499
» Ontology-based Database Access
Sort
View
184
Voted
SIGMOD
2007
ACM
112views Database» more  SIGMOD 2007»
16 years 29 days ago
A random walk approach to sampling hidden databases
A large part of the data on the World Wide Web is hidden behind form-like interfaces. These interfaces interact with a hidden backend database to provide answers to user queries. ...
Arjun Dasgupta, Gautam Das, Heikki Mannila
90
Voted
ADBIS
2008
Springer
128views Database» more  ADBIS 2008»
15 years 7 months ago
Pylonix: A Database Module for Collaborative Document Management
Abstract. In today’s world, document management plays an increasingly important role. However, there is currently no solution to manage complex documents in an integrated manner....
Christian Tilgner, Dietrich Christopeit, Klaus R. ...
89
Voted
ACSAC
2006
IEEE
15 years 6 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
104
Voted
AVBPA
2005
Springer
303views Biometrics» more  AVBPA 2005»
15 years 6 months ago
Indexing Biometric Databases Using Pyramid Technique
Abstract. Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. In spite of the rapid proliferation of large-scale dat...
Amit Mhatre, Sharat Chikkerur, Venu Govindaraju
94
Voted
CIKM
2005
Springer
15 years 6 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar