Sciweavers

703 search results - page 58 / 141
» The data management problem in post-pc devices and a solutio...
Sort
View
RAID
2010
Springer
14 years 8 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
PVLDB
2010
172views more  PVLDB 2010»
14 years 8 months ago
Secure Personal Data Servers: a Vision Paper
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Citizen themselves often count on in...
Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yan...
WWW
2008
ACM
15 years 10 months ago
Online change detection in individual web user behaviour
Based on our field studies and consultations with field experts, we identified three main problems that are of key importance to online web personalization and customer relationsh...
Peter Hofgesang, Jan Peter Patist
CODES
2008
IEEE
14 years 11 months ago
Application specific non-volatile primary memory for embedded systems
Memory subsystems have been considered as one of the most critical components in embedded systems and furthermore, displaying increasing complexity as application requirements div...
Kwangyoon Lee, Alex Orailoglu
ESCIENCE
2006
IEEE
15 years 3 months ago
A Unified Data Grid Replication Framework
Modern scientific experiments can generate large amounts of data, which may be replicated and distributed across multiple resources to improve application performance and fault to...
Tim Ho, David Abramson