Sciweavers

947 search results - page 108 / 190
» Information Security in Mobile Databases
Sort
View
113
Voted
SIGMOD
2004
ACM
128views Database» more  SIGMOD 2004»
16 years 3 months ago
A context-aware methodology for very small data base design
The design of a Data Base to be resident on portable devices and embedded processors for professional systems requires considering both the device memory peculiarities and the mobi...
Cristiana Bolchini, Fabio A. Schreiber, Letizia Ta...
129
Voted
BTW
2005
Springer
127views Database» more  BTW 2005»
15 years 5 months ago
Towards Reliable Data Stream Processing with OSIRIS-SE
: Recent advances in sensor technologies, wireless communication, powerful mobile devices, and wearable computers strongly support novel types of applications. Especially in health...
Gert Brettlecker, Heiko Schuldt, Hans-Jörg Sc...
117
Voted
ICMCS
2009
IEEE
123views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Wikireality: Augmenting reality with community driven websites
We present a system for making community driven websites easily accessible from the latest mobile devices. Many of these new devices contain an ensemble of sensors such as cameras...
Douglas Gray, Igor Kozintsev, Yi Wu, Horst W. Haus...
146
Voted
DBSEC
2000
138views Database» more  DBSEC 2000»
15 years 4 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
157
Voted
CIKM
2008
Springer
15 years 5 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong