Sciweavers

325 search results - page 15 / 65
» A Model of Methods Access Authorization in Object-oriented D...
Sort
View
ICML
2000
IEEE
14 years 8 months ago
Learning to Create Customized Authority Lists
The proliferation of hypertext and the popularity of Kleinberg's HITS algorithm have brought about an increased interest in link analysis. While HITS and its older relatives ...
Huan Chang, David Cohn, Andrew McCallum
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 1 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
BMCBI
2004
265views more  BMCBI 2004»
13 years 7 months ago
ASAView: Database and tool for solvent accessibility representation in proteins
Background: Accessible surface area (ASA) or solvent accessibility of amino acids in a protein has important implications. Knowledge of surface residues helps in locating potentia...
Shandar Ahmad, M. Michael Gromiha, Hamed Fawareh, ...
JUCS
2007
122views more  JUCS 2007»
13 years 7 months ago
Efficient Access Methods for Temporal Interval Queries of Video Metadata
: Indexing video content is one of the most important problems in video databases. In this paper we present linear time and space algorithms for handling video metadata that repres...
Spyros Sioutas, Kostas Tsichlas, Bill Vassiliadis,...
WSC
1998
13 years 9 months ago
Array-driven Simulation of Real Databases
A method to represent actual relational databases with arrays for simulation modeling of their performance as part of a software/hardware system has been created. The method inclu...
William S. Keezer