Sciweavers

2299 search results - page 188 / 460
» Logical Data Expiration
Sort
View
SIAMCOMP
2012
13 years 6 months ago
Tabulation-Based 5-Independent Hashing with Applications to Linear Probing and Second Moment Estimation
Abstract. In the framework of Carter and Wegman, a k-independent hash function maps any k keys independently. It is known that 5independent hashing provides good expected performan...
Mikkel Thorup, Yin Zhang
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 11 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
ISSTA
2012
ACM
13 years 6 months ago
Swarm testing
Swarm testing is a novel and inexpensive way to improve the diversity of test cases generated during random testing. Increased diversity leads to improved coverage and fault detec...
Alex Groce, Chaoqiang Zhang, Eric Eide, Yang Chen,...
DOLAP
2006
ACM
15 years 10 months ago
Designing ETL processes using semantic web technologies
One of the most important tasks performed in the early stages of a data warehouse project is the analysis of the structure and content of the existing data sources and their inten...
Dimitrios Skoutas, Alkis Simitsis
DOLAP
2005
ACM
15 years 6 months ago
Towards a spatial multidimensional model
Data warehouses and OLAP systems help to interactively analyze huge volume of data. This data, extracted from transactional databases, frequently contains spatial information whic...
Sandro Bimonte, Anne Tchounikine, Maryvonne Miquel