Sciweavers

554 search results - page 36 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
DMDW
2000
118views Management» more  DMDW 2000»
13 years 9 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
AI
2008
Springer
13 years 9 months ago
A Novel Approach for Social Behavior Analysis of the Blogosphere
The web, as a real mass medium, has become an invaluable data source for Information Extraction and Retrieval systems. Digital authoring is a relatively new style of communication,...
Reza Zafarani, Mohammad-Amin Jashki, Hamidreza Bag...
DANTE
1999
IEEE
150views Database» more  DANTE 1999»
13 years 12 months ago
Modeling and Executing the Data Warehouse Refreshment Process
Data warehouse refreshment is often viewed as a problem of maintaining materialized views over operational sources. In this paper, we show that the data warehouse refreshment proc...
Athanasios Vavouras, Stella Gatziu, Klaus R. Dittr...
SENSYS
2003
ACM
14 years 26 days ago
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
Data dissemination from sources to sinks is one of the main functions in sensor networks. In this paper, we propose SEAD, a Scalable Energy-efficient Asynchronous Dissemination pr...
Hyung Seok Kim, Tarek F. Abdelzaher, Wook Hyun Kwo...
SIGMOD
2006
ACM
156views Database» more  SIGMOD 2006»
14 years 7 months ago
Data delivery in a service-oriented world: the BEA aquaLogic data services platform
"Wow. I fell asleep listening to SOA music, and when I woke up, I couldn't remember where I'd put my data. Now what?" Has this happened to you? With the new pu...
Michael J. Carey