Sciweavers

641 search results - page 50 / 129
» Massive-Scale Data Management using Standards-Based Solution...
Sort
View
SISW
2005
IEEE
15 years 9 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea
DAWAK
2008
Springer
15 years 5 months ago
Mining Conditional Cardinality Patterns for Data Warehouse Query Optimization
Abstract. Data mining algorithms are often embedded in more complex systems, serving as the provider of data for internal decision making within these systems. In this paper we add...
Mikolaj Morzy, Marcin Krystek
173
Voted
JPDC
2008
217views more  JPDC 2008»
15 years 3 months ago
Parallel techniques for information extraction from hyperspectral imagery using heterogeneous networks of workstations
Recent advances in space and computer technologies are revolutionizing the way remotely sensed data is collected, managed and interpreted. In particular, NASA is continuously gath...
Antonio J. Plaza
ACSAC
2002
IEEE
15 years 8 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
129
Voted
SCFBM
2008
104views more  SCFBM 2008»
15 years 3 months ago
A Perl toolkit for LIMS development
Background: High throughput laboratory techniques generate huge quantities of scientific data. Laboratory Information Management Systems (LIMS) are a necessary requirement, dealin...
James A. Morris, Simon A. Gayther, Ian J. Jacobs, ...