Sciweavers

1830 search results - page 216 / 366
» Implementing a Tamper-Evident Database System
Sort
View
125
Voted
OOPSLA
1992
Springer
15 years 7 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
169
Voted
ICDE
2012
IEEE
239views Database» more  ICDE 2012»
13 years 6 months ago
Provenance-based Indexing Support in Micro-blog Platforms
Abstract— Recently, lots of micro-blog message sharing applications have emerged on the web. Users can publish short messages freely and get notified by the subscriptions instan...
Junjie Yao, Bin Cui, Zijun Xue, Qingyun Liu
238
Voted
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
16 years 3 months ago
High-performance complex event processing over streams
In this paper, we present the design, implementation, and evaluation of a system that executes complex event queries over real-time streams of RFID readings encoded as events. The...
Eugene Wu 0002, Yanlei Diao, Shariq Rizvi
205
Voted
VLDB
2007
ACM
169views Database» more  VLDB 2007»
16 years 3 months ago
Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing
In distributed stream processing environments, large numbers of continuous queries are distributed onto multiple servers. When one or more of these servers become overloaded due t...
Nesime Tatbul, Stanley B. Zdonik, Ugur Çeti...
167
Voted
BMCBI
2008
208views more  BMCBI 2008»
15 years 3 months ago
GraphFind: enhancing graph searching by low support data mining techniques
Background: Biomedical and chemical databases are large and rapidly growing in size. Graphs naturally model such kinds of data. To fully exploit the wealth of information in these...
Alfredo Ferro, Rosalba Giugno, Misael Mongiov&igra...