Sciweavers

1907 search results - page 79 / 382
» Integrating databases and workflow systems
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ICDE
2009
IEEE
200views Database» more  ICDE 2009»
14 years 11 months ago
Adaptive Scheduling of Web Transactions
In highly interactive dynamic web database systems, user satisfaction determines their success. In such systems, userrequested web pages are dynamically created by executing a numb...
Shenoda Guirguis, Mohamed A. Sharaf, Panos K. Chry...
ISCI
2002
132views more  ISCI 2002»
13 years 9 months ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...
SIGMOD
2007
ACM
147views Database» more  SIGMOD 2007»
14 years 9 months ago
Extending relational query optimization to dynamic schemas for information integration in multidatabases
This paper extends relational processing and optimization to the FISQL/FIRA languages for dynamic schema queries over multidatabases. Dynamic schema queries involve the creation a...
Catharine M. Wyss, Felix I. Wyss
ICEIS
2002
IEEE
14 years 2 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh