Sciweavers

1830 search results - page 21 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2011
IEEE
222views Database» more  ICDE 2011»
12 years 11 months ago
Dynamic prioritization of database queries
— Enterprise database systems handle a variety of diverse query workloads that are of different importance to the business. For example, periodic reporting queries are usually mi...
Sivaramakrishnan Narayanan, Florian Waas
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 10 months ago
Querying contract databases based on temporal behavior
Considering a broad definition for service contracts (beyond web services and software, e.g. airline tickets and insurance policies), we tackle the challenges of building a high ...
Elio Damaggio, Alin Deutsch, Dayou Zhou
JASIS
2000
143views more  JASIS 2000»
13 years 7 months ago
Discovering knowledge from noisy databases using genetic programming
s In data mining, we emphasize the need for learning from huge, incomplete and imperfect data sets (Fayyad et al. 1996, Frawley et al. 1991, Piatetsky-Shapiro and Frawley, 1991). T...
Man Leung Wong, Kwong-Sak Leung, Jack C. Y. Cheng
NAR
1998
112views more  NAR 1998»
13 years 7 months ago
MITOMAP: a human mitochondrial genome database--1998 update
We have continued to develop MITOMAP (http://www.gen.emory.edu/MITOMAP ), a comprehensive database for the human mitochondrial DNA (mtDNA). MITOMAP uses the mtDNA sequence as the ...
Andreas M. Kogelnik, Marie T. Lott, Michael D. Bro...
IAJIT
2010
157views more  IAJIT 2010»
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi