Sciweavers

240 search results - page 5 / 48
» Recollection: Integrating Data through Access
Sort
View
ICEIS
2002
IEEE
14 years 1 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
SBCCI
2009
ACM
188views VLSI» more  SBCCI 2009»
14 years 3 months ago
Low-power inter-core communication through cache partitioning in embedded multiprocessors
We present an application-driven customization methodology for energy-efficient inter-core communication in embedded multiprocessors. The methodology leverages configurable cach...
Chenjie Yu, Xiangrong Zhou, Peter Petrov
DILS
2009
Springer
13 years 6 months ago
Slicing through the Scientific Literature
Abstract. Success in the life sciences depends on access to information in knowledge bases and literature. Finding and extracting the relevant information depends on a user's ...
Christopher J. O. Baker, Patrick Lambrix, Jonas La...
DEXAW
2006
IEEE
104views Database» more  DEXAW 2006»
14 years 4 days ago
On Using Simplification and Correction Tables for Integrity Maintenance in Integrated Databases
When a database is defined as views over autonomous sources, inconsistencies with respect to global integrity constraints are to be expected. This paper investigates the possibili...
Henning Christiansen, Davide Martinenghi
VLDB
1998
ACM
134views Database» more  VLDB 1998»
14 years 20 days ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...