Sciweavers

258 search results - page 49 / 52
» Effective Management of Hierarchical Storage Using Two Level...
Sort
View
CIKM
2005
Springer
14 years 1 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 2 months ago
Operationalised Business Intelligence: Knowledge Sharing with an Enterprise Ambition at the Amsterdam-Amstelland Police Departme
In this article we describe the operationalised Business Intelligence (BI) environment of the Amsterdam-Amstelland Police Department (AAPD) as it presented itself in the spring of...
Stijn Viaene, Luc Lutin, Steven De Hertogh
BMCBI
2010
156views more  BMCBI 2010»
13 years 7 months ago
Comparative classification of species and the study of pathway evolution based on the alignment of metabolic pathways
Background: Pathways provide topical descriptions of cellular circuitry. Comparing analogous pathways reveals intricate insights into individual functional differences among speci...
Adi Mano, Tamir Tuller, Oded Béjà, R...
SC
1992
ACM
13 years 11 months ago
Willow: A Scalable Shared Memory Multiprocessor
We are currently developing Willow, a shared-memory multiprocessor whose design provides system capacity and performance capable of supporting over a thousand commercial microproc...
John K. Bennett, Sandhya Dwarkadas, Jay A. Greenwo...
GIS
2006
ACM
14 years 8 months ago
Filtering with raster signatures
Efficient evaluation of spatial queries is an important issue in spatial database. Among spatial operations, spatial join is very useful, intersection being the most common predic...
Leonardo Guerreiro Azevedo, Ralf Hartmut Güti...