Sciweavers

8249 search results - page 1398 / 1650
» The DBO database system
Sort
View
ER
2007
Springer
97views Database» more  ER 2007»
15 years 10 months ago
Towards Active Conceptual Modelling for Sudden Events
There are a number of issues for information systems which are required to collect data urgently that are not well accommodated by current conceptual modelling methodologies and a...
John F. Roddick, Aaron Ceglar, Denise de Vries
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 10 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
ISCA
2006
IEEE
133views Hardware» more  ISCA 2006»
15 years 10 months ago
TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Qing Yang, Weijun Xiao, Jin Ren
SAC
2006
ACM
15 years 10 months ago
Automatic structured query transformation over distributed digital libraries
Structured data and complex schemas are becoming the main way to represent the information many Digital Libraries provide, thus impacting the services they offer. When searching i...
M. Elena Renda, Umberto Straccia
CCS
2005
ACM
15 years 10 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
« Prev « First page 1398 / 1650 Last » Next »