Sciweavers

3377 search results - page 67 / 676
» Describing differences between databases
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
15 years 5 days ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
OTM
2005
Springer
15 years 8 months ago
Probabilistic Ontologies and Relational Databases
The relational algebra and calculus do not take the semantics of terms into account when answering queries. As a consequence, not all tuples that should be returned in response to ...
Octavian Udrea, Yu Deng, Edward Hung, V. S. Subrah...
BMCBI
2006
115views more  BMCBI 2006»
15 years 2 months ago
AgdbNet - antigen sequence database software for bacterial typing
Background: Bacterial typing schemes based on the sequences of genes encoding surface antigens require databases that provide a uniform, curated, and widely accepted nomenclature ...
Keith A. Jolley, Martin C. J. Maiden
TIFS
2008
129views more  TIFS 2008»
15 years 2 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
98
Voted
ICISS
2005
Springer
15 years 8 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang