Sciweavers

1830 search results - page 117 / 366
» Implementing a Tamper-Evident Database System
Sort
View
GIS
2009
ACM
14 years 11 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
BMCBI
2006
164views more  BMCBI 2006»
13 years 10 months ago
BIOZON: a system for unification, management and analysis of heterogeneous biological data
Integration of heterogeneous data types is a challenging problem, especially in biology, where the number of databases and data types increase rapidly. Amongst the problems that o...
Aaron Birkland, Golan Yona
STEP
2003
IEEE
14 years 3 months ago
Improvement of Test Data by Measuring SQL Statement Coverage
Many software applications produced today have a component, of lesser or greater importance to the structure, that is based on database management systems. What is more, this infor...
María José Suárez Cabal, Javi...
BMCBI
2008
106views more  BMCBI 2008»
13 years 10 months ago
An Integrated Korean Biodiversity and Genetic Information Retrieval System
Background: On-line biodiversity information databases are growing quickly and being integrated into general bioinformatics systems due to the advances of fast gene sequencing tec...
Jeongheui Lim, Jong Bhak, Hee-Mock Oh, Chang-Bae K...
DEXAW
2007
IEEE
162views Database» more  DEXAW 2007»
14 years 4 months ago
Coordination in Service Oriented Architectures Using Transaction Processing Concepts
Service oriented architectures (SOAs) provide an architectural paradigm to develop and evolve enterprise information systems. A key feature of SOAs is compensability of services. ...
Peter Hrastnik, Werner Winiwarter