Sciweavers

4113 search results - page 68 / 823
» Watermarking Relational Databases
Sort
View
113
Voted
CSREASAM
2006
15 years 4 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
230
Voted
VLDB
2008
ACM
196views Database» more  VLDB 2008»
16 years 3 months ago
Modelling retrieval models in a probabilistic relational algebra with a new operator: the relational Bayes
This paper presents a probabilistic relational modelling (implementation) of the major probabilistic retrieval models. Such a high-level implementation is useful since it supports ...
Thomas Rölleke, Hengzhi Wu, Jun Wang, Hany Azzam
97
Voted
TPCTC
2009
Springer
63views Hardware» more  TPCTC 2009»
15 years 10 months ago
Generating Shifting Workloads to Benchmark Adaptability in Relational Database Systems
Tilmann Rabl, Andreas Lang, Thomas Hackl, Bernhard...
WCRE
2008
IEEE
15 years 9 months ago
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas
Data modeling is an essential part of the software development process, and together with application modeling forms the core of the model-driven approach to software engineering....
Manar H. Alalfi, James R. Cordy, Thomas R. Dean