Sciweavers

788 search results - page 148 / 158
» Secure Data Objects Replication in Data Grid
Sort
View
JAMIA
2011
101views more  JAMIA 2011»
12 years 10 months ago
The military health system's personal health record pilot with Microsoft HealthVault and Google Health
Objective To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages MicrosoftÒ HealthVault and GoogleÒ Hea...
Nhan V. Do, Rick Barnhill, Kimberly A. Heermann-Do...
SIGMOD
2011
ACM
270views Database» more  SIGMOD 2011»
12 years 10 months ago
Automatic discovery of attributes in relational databases
In this work we design algorithms for clustering relational columns into attributes, i.e., for identifying strong relationships between columns based on the common properties and ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
OSDI
1994
ACM
13 years 9 months ago
A Caching Model of Operating System Kernel Functionality
Operating system research has endeavored to develop micro-kernels that provide modularity, reliability and security improvements over conventional monolithic kernels. However, the...
David R. Cheriton, Kenneth J. Duda
CSE
2009
IEEE
14 years 2 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
APLAS
2009
ACM
14 years 2 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue