Sciweavers

1235 search results - page 60 / 247
» Updating a cracked database
Sort
View
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
AI
2001
Springer
15 years 2 months ago
A Low-Scan Incremental Association Rule Maintenance Method Based on the Apriori Property
As new transactions update data sources and subsequently the data warehouse, the previously discovered association rules in the old database may no longer be interesting rules in ...
Zequn Zhou, C. I. Ezeife
AMAST
2008
Springer
14 years 11 months ago
Implementing a Categorical Information System
The authors have proposed using category-theoretic sketches to enhance database design and integration methodologies. The algebraic context is called the Sketch Data Model (SkDM) a...
Michael Johnson, Robert D. Rosebrugh
SIGMOD
2002
ACM
177views Database» more  SIGMOD 2002»
15 years 10 months ago
Coordinating backup/recovery and data consistency between database and file systems
Managing a combined store consisting of database data and file data in a robust and consistent manner is a challenge for database systems and content management systems. In such a...
Suparna Bhattacharya, C. Mohan, Karen Brannon, Ind...
KAIS
2000
139views more  KAIS 2000»
14 years 9 months ago
Incremental View Maintenance for Mobile Databases
In a mobile environment, querying a database at a stationary server from a mobile client is expensive due to the limited bandwidth of a wireless channel and the instability of the ...
Ken C. K. Lee, Hong Va Leong, Antonio Si