Sciweavers

1398 search results - page 251 / 280
» Medical Database Security
Sort
View
ACISP
1997
Springer
14 years 1 months ago
Enabling Technology for the Trading of MPEG-encoded Video
tracts, pp. 11-17. (http://www.qucis.queens.ca/achallc97/papers/p028.html) Alexa, Melina; Rostek, Lothar Pattern Concordances - TATOE calls XGrammar. Presented at ACH -ALLC97, King...
Jana Dittmann, Arnd Steinmetz
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
14 years 9 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
SIGMOD
2007
ACM
188views Database» more  SIGMOD 2007»
14 years 9 months ago
Keyword search on relational data streams
Increasing monitoring of transactions, environmental parameters, homeland security, RFID chips and interactions of online users rapidly establishes new data sources and applicatio...
Alexander Markowetz, Yin Yang, Dimitris Papadias
SIGMOD
2002
ACM
142views Database» more  SIGMOD 2002»
14 years 9 months ago
The Grid: An Application of the Semantic Web
The Grid is an emerging platform to support on-demand "virtual organisations" for coordinated resource sharing and problem solving on a global scale. The application thr...
Carole A. Goble, David De Roure
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 9 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...