Sciweavers

123 search results - page 10 / 25
» Dependency Management for the Preservation of Digital Inform...
Sort
View
IWMMDBMS
1998
139views more  IWMMDBMS 1998»
13 years 8 months ago
Fusion of Multimedia Information
: In recent years the fusion of multimedia information from multiple real-time sources and databases has become increasingly important because of its practical significance in many...
Shi-Kuo Chang, Taieb Znati
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
PODS
2004
ACM
158views Database» more  PODS 2004»
14 years 7 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
CIKM
2008
Springer
13 years 8 months ago
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. In this paper, we present location-dependent attack resulting from continuous...
Xiao Pan, Jianliang Xu, Xiaofeng Meng
WOTUG
2007
13 years 8 months ago
Concurrency Control and Recovery Management for Open e-Business Transactions
Concurrency control mechanisms such as turn-taking, locking, serialization, transactional locking mechanism, and operational transformation try to provide data consistency when con...
Amir R. Razavi, Sotiris Moschoyiannis, Paul J. Kra...