Sciweavers

1830 search results - page 68 / 366
» Implementing a Tamper-Evident Database System
Sort
View
JNCA
2006
86views more  JNCA 2006»
13 years 10 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
IADIS
2003
13 years 11 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
SIGMOD
2012
ACM
226views Database» more  SIGMOD 2012»
12 years 15 days ago
SkewTune: mitigating skew in mapreduce applications
We present an automatic skew mitigation approach for userdefined MapReduce programs and present SkewTune, a system that implements this approach as a drop-in replacement for an e...
YongChul Kwon, Magdalena Balazinska, Bill Howe, Je...
IV
2000
IEEE
95views Visualization» more  IV 2000»
14 years 2 months ago
An Information Database for VRML Cities
A system is presented to visualize information about city with a three-dimensional web user interface. We present a novel way to connect a VRML world to an information database. A...
Arttu Heinonen, Simo Pulkkinen, Ismo Rakkolainen
GEOINFORMATICA
2008
123views more  GEOINFORMATICA 2008»
13 years 10 months ago
Efficient Implementation Techniques for Topological Predicates on Complex Spatial Objects
Topological relationships like overlap, inside, meet, and disjoint uniquely characterize the relative position between objects in space. For a long time, they have been a focus of...
Reasey Praing, Markus Schneider