Sciweavers

1251 search results - page 81 / 251
» Management of User Preferences in Data Intensive Application...
Sort
View
257
Voted
ICDE
2007
IEEE
187views Database» more  ICDE 2007»
16 years 5 months ago
RFID Data Processing with a Data Stream Query Language
RFID technology provides significant advantages over traditional object-tracking technology and is increasingly adopted and deployed in real applications. RFID applications genera...
Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo...
135
Voted
AINA
2006
IEEE
15 years 9 months ago
Peer-to-Peer Usage Analysis: a Distributed Mining Approach
With the huge number of information sources available on the Internet, Peer-to-Peer (P2P) systems offer a novel kind of system architecture providing the large-scale community wit...
Florent Masseglia, Pascal Poncelet, Maguelonne Tei...
213
Voted
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 5 months ago
UNIT: User-centric Transaction Management in Web-Database Systems
Web-database systems are nowadays an integral part of everybody's life, with applications ranging from monitoring/trading stock portfolios, to personalized blog aggregation a...
Alexandros Labrinidis, Daniel Mossé, Huimin...
98
Voted
CHI
2003
ACM
16 years 4 months ago
Personal media exploration with semantic regions
Computer users deal with large amount of personal media data and they often face problems in managing and exploring them. The paper presents an innovative approach, Semantic Regio...
Hyunmo Kang
218
Voted
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 10 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang