Sciweavers

1830 search results - page 72 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMOD
2008
ACM
222views Database» more  SIGMOD 2008»
14 years 10 months ago
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks
This demo presents a privacy-preserving aggregate location monitoring system, namely, TinyCasper, in which we can monitor moving objects in wireless sensor networks while preservi...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
14 years 10 months ago
FPGA: what's in it for a database?
While there seems to be a general agreement that next years' systems will include many processing cores, it is often overlooked that these systems will also include an increa...
Jens Teubner, René Müller
ADB
1994
311views Database» more  ADB 1994»
14 years 2 months ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle
ICDE
2011
IEEE
258views Database» more  ICDE 2011»
13 years 1 months ago
SystemML: Declarative machine learning on MapReduce
Abstract—MapReduce is emerging as a generic parallel programming paradigm for large clusters of machines. This trend combined with the growing need to run machine learning (ML) a...
Amol Ghoting, Rajasekar Krishnamurthy, Edwin P. D....
SIGMOD
2008
ACM
65views Database» more  SIGMOD 2008»
14 years 10 months ago
Generating targeted queries for database testing
Tools for generating test queries for databases do not explicitly take into account the actual data in the database. As a consequence, such tools cannot guarantee suitable coverag...
Chaitanya Mishra, Nick Koudas, Calisto Zuzarte