Sciweavers

13863 search results - page 2729 / 2773
» Providing Database as a Service
Sort
View
IFIP
2001
Springer
15 years 8 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
VLDB
2001
ACM
148views Database» more  VLDB 2001»
15 years 8 months ago
Indexing and Querying XML Data for Regular Path Expressions
With the advent of XML as a standard for data representation and exchange on the Internet, storing and querying XML data becomes more and more important. Several XML query languag...
Quanzhong Li, Bongki Moon
VLDB
2001
ACM
97views Database» more  VLDB 2001»
15 years 8 months ago
Functional Properties of Information Filtering
In recent years, due to the increasing popularization of data broadcasting, the volume and variety of data being broadcast are rapidly increasing. In this environment, as it is di...
Rie Sawai, Masahiko Tsukamoto, Yin-Huei Loh, Tsuto...
VLDB
2001
ACM
129views Database» more  VLDB 2001»
15 years 8 months ago
Similarity Search for Adaptive Ellipsoid Queries Using Spatial Transformation
Similarity retrieval mechanisms should utilize generalized quadratic form distance functions as well as the Euclidean distance function since ellipsoid queries parameters may vary...
Yasushi Sakurai, Masatoshi Yoshikawa, Ryoji Kataok...
SIGUCCS
2000
ACM
15 years 8 months ago
Three Years in the Solution Center
After thirty-plus years of making small “mid-course corrections” types of changes to the support paradigm, many on the Iowa State University campus thought it was time to make...
Frank Poduska
« Prev « First page 2729 / 2773 Last » Next »