Sciweavers

1480 search results - page 248 / 296
» Supporting Real-world Activities in Database Management Syst...
Sort
View
DBSEC
2008
196views Database» more  DBSEC 2008»
14 years 11 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
ESCIENCE
2007
IEEE
15 years 4 months ago
Building a Data Grid for the Australian Nanostructural Analysis Network
: This paper describes the architecture and services developed by the GRANI project for the Australian Nanostructural Analysis Network Organization (NANO). The aim of GRANI was to ...
Brendan Mauger, Jane Hunter, John Drennan, Ashley ...
ACMICEC
2007
ACM
144views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Needs-based analysis of online customer reviews
Needs-based analysis lies at the intersection of product marketing and new product development. It is the study of why consumers purchase and what they do with those purchases. In...
Thomas Y. Lee
ICDE
2007
IEEE
187views Database» more  ICDE 2007»
15 years 11 months ago
RFID Data Processing with a Data Stream Query Language
RFID technology provides significant advantages over traditional object-tracking technology and is increasingly adopted and deployed in real applications. RFID applications genera...
Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo...
SIGMOD
2005
ACM
177views Database» more  SIGMOD 2005»
15 years 10 months ago
An approach for pipelining nested collections in scientific workflows
We describe an approach for pipelining nested data collections in scientific workflows. Our approach logically delimits arbitrarily nested collections of data tokens using special...
Timothy M. McPhillips, Shawn Bowers