Sciweavers

291 search results - page 50 / 59
» Model driven development of secure XML databases
Sort
View
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 7 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
DEXAW
1997
IEEE
99views Database» more  DEXAW 1997»
13 years 11 months ago
A Framework for Dynamic Changes in Workflow Management Systems
Current workflow management systems (WFMSs) are only applicable in a reliable and secure manner, if the business process (BP) to be supported is wellstructured. As ad hoc deviatio...
Manfred Reichert, Peter Dadam
BMCBI
2008
226views more  BMCBI 2008»
13 years 7 months ago
ProteoLens: a visual analytic tool for multi-scale database-driven biological network data mining
Background: New systems biology studies require researchers to understand how interplay among myriads of biomolecular entities is orchestrated in order to achieve high-level cellu...
Tianxiao Huan, Andrey Y. Sivachenko, Scott H. Harr...
BTW
2007
Springer
236views Database» more  BTW 2007»
13 years 11 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann