Sciweavers

669 search results - page 130 / 134
» Business Process Modeling: A Service-Oriented Approach
Sort
View
DASFAA
2009
IEEE
253views Database» more  DASFAA 2009»
13 years 12 months ago
Implementing and Optimizing Fine-Granular Lock Management for XML Document Trees
Abstract. Fine-grained lock protocols with lock modes and lock granules adjusted to the various XML processing models, allow for highly concurrent transaction processing on XML tre...
Sebastian Bächle, Theo Härder, Michael P...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 9 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
14 years 9 months ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
IQ
2007
13 years 10 months ago
Rule-Based Measurement Of Data Quality In Nominal Data
: Sufficiently high data quality is crucial for almost every application. Nonetheless, data quality issues are nearly omnipresent. The reasons for poor quality cannot simply be bla...
Jochen Hipp, Markus Müller, Johannes Hohendor...
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 2 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...