Sciweavers

150 search results - page 11 / 30
» Detecting anomalous access patterns in relational databases
Sort
View
SACMAT
2006
ACM
14 years 1 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
14 years 9 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
FAST
2004
13 years 9 months ago
Atropos: A Disk Array Volume Manager for Orchestrated Use of Disks
The Atropos logical volume manager allows applications to exploit characteristics of its underlying collection of disks. It stripes data in track-sized units and explicitly expose...
Jiri Schindler, Steven W. Schlosser, Minglong Shao...
BMCBI
2010
163views more  BMCBI 2010»
13 years 7 months ago
Integration of open access literature into the RCSB Protein Data Bank using BioLit
Background: Biological data have traditionally been stored and made publicly available through a variety of on-line databases, whereas biological knowledge has traditionally been ...
Andreas Prlic, Marco A. Martinez, Dimitris Dimitro...
VLDB
2005
ACM
139views Database» more  VLDB 2005»
14 years 1 months ago
Tree-Pattern Queries on a Lightweight XML Processor
Popular XML languages, like XPath, use “treepattern” queries to select nodes based on their structural characteristics. While many processing methods have already been propose...
Mirella Moura Moro, Zografoula Vagena, Vassilis J....