Sciweavers

367 search results - page 39 / 74
» Implementing P3P Using Database Technology
Sort
View
ACISICIS
2007
IEEE
14 years 3 months ago
An Efficient and Robust Technique for Region Based Shape Representation and Retrieval
Most region based shape image retrieval techniques in literature are complex to implement. As the result of their complex computations, the retrieval performance of these techniqu...
Dengsheng Zhang, Melissa Chen Yi Lim
DASFAA
2009
IEEE
125views Database» more  DASFAA 2009»
14 years 3 months ago
Flexibility as a Service
Abstract. The lack of flexibility is often seen as an inhibitor for the successful application of workflow technology. Many researchers have proposed different ways of addressin...
Wil M. P. van der Aalst, Michael Adams, Arthur H. ...
IEEEIAS
2009
IEEE
14 years 3 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
WIDM
2003
ACM
14 years 1 months ago
XVerter: querying XML data with OR-DBMS
Storage techniques and queries over XML databases are being widely studied. Most works store XML documents in traditional DBMSs in order to take advantage of a well established te...
Humberto Vieira, Gabriela Ruberg, Marta Mattoso
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
14 years 3 months ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung