Sciweavers

10500 search results - page 1952 / 2100
» Documentation for
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
16 years 4 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
EDBT
2002
ACM
120views Database» more  EDBT 2002»
16 years 4 months ago
Hyperdatabases: Infrastructure for the Information Space
The amount of stored information is exploding while, at the same time, tools for accessing relevant information are rather under-developed. Usually, all users have a pre-defined vi...
Hans-Jörg Schek
143
Voted
EDBT
2004
ACM
139views Database» more  EDBT 2004»
16 years 4 months ago
GRIDS, Databases, and Information Systems Engineering Research
GRID technology, emerging in the late nineties, has evolved from a metacomputing architecture towards a pervasive computation and information utility. However, the architectural de...
Keith G. Jeffery
EDBT
2006
ACM
177views Database» more  EDBT 2006»
16 years 4 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
ICSE
2003
IEEE-ACM
16 years 4 months ago
Patterns, Frameworks, and Middleware: Their Synergistic Relationships
The knowledge required to develop complex software has historically existed in programming folklore, the heads of experienced developers, or buried deep in the code. These locatio...
Douglas C. Schmidt, Frank Buschmann
« Prev « First page 1952 / 2100 Last » Next »