Sciweavers

947 search results - page 75 / 190
» Information Security in Mobile Databases
Sort
View
124
Voted
CSCW
2004
ACM
15 years 9 months ago
Collaborating around collections: informing the continued development of photoware
This paper explores the embodied interactional ways in which people naturally collaborate around and share collections of photographs. We employ ethnographic studies of paper-base...
Andy Crabtree, Tom Rodden, John A. Mariani
134
Voted
PODS
2005
ACM
136views Database» more  PODS 2005»
16 years 3 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
126
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 3 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
144
Voted
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
15 years 8 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...
133
Voted
DEXA
2003
Springer
106views Database» more  DEXA 2003»
15 years 9 months ago
Location Query Based on Moving Behaviors
The importance of location prediction is rapidly increasing with the current trend of database applications in mobile computing environment. However, current personal communicatio...
Ming-Hui Jin, Eric Hsiao-Kuang Wu, Jorng-Tzong Hor...