Sciweavers

2071 search results - page 70 / 415
» Behaviour Management in Database Applications
Sort
View
VLDB
1989
ACM
105views Database» more  VLDB 1989»
14 years 26 days ago
Monitoring Database Objects
A method is described for actively interfacing an Object-Oriented Database Management System (OODBMS) to application pre grams. The method, called a database monitor, observes how...
Tore Risch
VLDB
2001
ACM
119views Database» more  VLDB 2001»
14 years 9 months ago
PicoDBMS: Scaling down database techniques for the smartcard
Smartcards are the most secure portable computing device today. They have been used successfully in applications involving money, proprietary and personal data (such as banking, h...
Philippe Pucheral, Luc Bouganim, Patrick Valduriez...
PODS
2008
ACM
250views Database» more  PODS 2008»
14 years 9 months ago
Approximating predicates and expressive queries on probabilistic databases
We study complexity and approximation of queries in an expressive query language for probabilistic databases. The language studied supports the compositional use of confidence com...
Christoph Koch
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
14 years 9 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
JCP
2006
173views more  JCP 2006»
13 years 8 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar