Sciweavers

5221 search results - page 68 / 1045
» An On-line Problem Database
Sort
View
RAID
2010
Springer
13 years 8 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ICDE
2009
IEEE
190views Database» more  ICDE 2009»
14 years 12 months ago
Progressive Keyword Search in Relational Databases
A common approach to performing keyword search over relational databases is to find the minimum Steiner trees in database graphs. These methods, however, are rather expensive as th...
Guoliang Li, Xiaofang Zhou, Jianhua Feng, Jianyong...
VLDB
2000
ACM
146views Database» more  VLDB 2000»
14 years 1 months ago
A Database Platform for Bioinformatics
In recent years, new developments in genetics have generated a lot of interest in genomic and proteomic data, investing international significance (and competition) in the fledgli...
Sandeepan Banerjee
ICDE
2010
IEEE
221views Database» more  ICDE 2010»
13 years 10 months ago
A generic auto-provisioning framework for cloud databases
— We discuss the problem of resource provisioning for database management systems operating on top of an Infrastructure-As-A-Service (IaaS) cloud. To solve this problem, we descr...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 9 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier