Sciweavers

1914 search results - page 301 / 383
» Web Data Management Practices - Emerging Techniques and Tech...
Sort
View
ICEIS
2002
IEEE
15 years 2 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
IH
2001
Springer
15 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
CIKM
2008
Springer
14 years 12 months ago
A sparse gaussian processes classification framework for fast tag suggestions
Tagged data is rapidly becoming more available on the World Wide Web. Web sites which populate tagging services offer a good way for Internet users to share their knowledge. An in...
Yang Song, Lu Zhang 0007, C. Lee Giles
CLOUDCOM
2009
Springer
15 years 4 months ago
Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation
Abstract. Virtualization technology has become commonplace in modern data centers and cluster systems, often referred as “computing clouds”. In particular, the capability of vi...
William Voorsluys, James Broberg, Srikumar Venugop...
IJSWIS
2008
135views more  IJSWIS 2008»
14 years 10 months ago
Efficient Processing of RDF Queries with Nested Optional Graph Patterns in an RDBMS
Relational technology has shown to be very useful for scalable Semantic Web data management. Numerous researchers have proposed to use RDBMSs to store and query voluminous RDF dat...
Artem Chebotko, Shiyong Lu, Mustafa Atay, Farshad ...