Sciweavers

1830 search results - page 68 / 366
» Implementing a Tamper-Evident Database System
Sort
View
JNCA
2006
86views more  JNCA 2006»
15 years 3 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
IADIS
2003
15 years 4 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
SIGMOD
2012
ACM
226views Database» more  SIGMOD 2012»
13 years 5 months ago
SkewTune: mitigating skew in mapreduce applications
We present an automatic skew mitigation approach for userdefined MapReduce programs and present SkewTune, a system that implements this approach as a drop-in replacement for an e...
YongChul Kwon, Magdalena Balazinska, Bill Howe, Je...
IV
2000
IEEE
95views Visualization» more  IV 2000»
15 years 7 months ago
An Information Database for VRML Cities
A system is presented to visualize information about city with a three-dimensional web user interface. We present a novel way to connect a VRML world to an information database. A...
Arttu Heinonen, Simo Pulkkinen, Ismo Rakkolainen
GEOINFORMATICA
2008
123views more  GEOINFORMATICA 2008»
15 years 3 months ago
Efficient Implementation Techniques for Topological Predicates on Complex Spatial Objects
Topological relationships like overlap, inside, meet, and disjoint uniquely characterize the relative position between objects in space. For a long time, they have been a focus of...
Reasey Praing, Markus Schneider