Sciweavers

1457 search results - page 188 / 292
» Privacy Challenges for Database Systems
Sort
View
116
Voted
CCS
2007
ACM
15 years 8 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
121
Voted
CCS
2007
ACM
15 years 8 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
SIGMOD
2010
ACM
214views Database» more  SIGMOD 2010»
15 years 7 months ago
ParaTimer: a progress indicator for MapReduce DAGs
Time-oriented progress estimation for parallel queries is a challenging problem that has received only limited attention. In this paper, we present ParaTimer, a new type of timere...
Kristi Morton, Magdalena Balazinska, Dan Grossman
196
Voted
EDBT
2012
ACM
315views Database» more  EDBT 2012»
13 years 5 months ago
Sieve: linked data quality assessment and fusion
The Web of Linked Data grows rapidly and already contains data originating from hundreds of data sources. The quality of data from those sources is very diverse, as values may be ...
Pablo N. Mendes, Hannes Mühleisen, Christian ...
117
Voted
ER
1997
Springer
145views Database» more  ER 1997»
15 years 6 months ago
Enterprise Knowledge Management and Conceptual Modelling
Turbulence is in the nature of business environments. Changes brought about because of different requirements such as social, political, technical and economic, exert pressures on ...
Pericles Loucopoulos, Vagelio Kavakli