Sciweavers

1830 search results - page 150 / 366
» Implementing a Tamper-Evident Database System
Sort
View
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 3 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
ECIR
1998
Springer
13 years 11 months ago
Content Based Annotation and Retrieval in RAIDER
A new system, RAIDER (Retrieval and Annotation of Image Databases), has been developed for the management of image databases. RAIDER was designed to combat the inadequacies and in...
Stephanie R. Fountain, Tieniu Tan
VLDB
1991
ACM
147views Database» more  VLDB 1991»
14 years 1 months ago
Object Placement in Parallel Hypermedia Systems
During the past few years, hypermedia systems have emerged as an essential component of many application domains ranging from software engineering to library information systems. ...
Shahram Ghandeharizadeh, Luis Ramos, Zubair Asad, ...
ICDE
2008
IEEE
119views Database» more  ICDE 2008»
14 years 11 months ago
Toward Simulation-Based Optimization in Data Stream Management Systems
Abstract-- Our demonstration introduces a novel system architecture which massively facilitates optimization in data stream management systems (DSMS). The basic idea is to decouple...
Bernhard Seeger, Christoph Heinz, Jürgen Kr&a...
DEXAW
2006
IEEE
95views Database» more  DEXAW 2006»
14 years 4 months ago
Optimising Performance in Network-Based Information Systems: Virtual Organisations and Customised Views
Network-based information systems use well-defined standards to ensure interoperability and also have a tightly coupled relationship between their internal data representation an...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...