Sciweavers

2715 search results - page 223 / 543
» Database Publication Practices
Sort
View
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
14 years 8 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
EDBT
2008
ACM
102views Database» more  EDBT 2008»
14 years 8 months ago
Summary management in P2P systems
Sharing huge, massively distributed databases in P2P systems is inherently difficult. As the amount of stored data increases, data localization techniques become no longer suffici...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
ROMAN
2007
IEEE
124views Robotics» more  ROMAN 2007»
14 years 2 months ago
A Spoken Dialogue System for Electronic Program Guide Information Access
Abstract—In this paper, we present POSTECH Spoken Dialogue System for Electronic Program Guide Information Access (POSSDS-EPG). POSSDS-EPG consists of automatic speech recognizer...
Seokhwan Kim, Cheongjae Lee, Sangkeun Jung, Gary G...
VLDB
2005
ACM
97views Database» more  VLDB 2005»
14 years 1 months ago
Fine-Grained Replication and Scheduling with Freshness and Correctness Guarantees
Lazy replication protocols provide good scalability properties by decoupling transaction execution from the propagation of new values to replica sites while guaranteeing a correct...
Fuat Akal, Can Türker, Hans-Jörg Schek, ...
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 1 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...