Sciweavers

1323 search results - page 128 / 265
» Updatable Security Views
Sort
View
127
Voted
SIGMOD
1999
ACM
135views Database» more  SIGMOD 1999»
15 years 6 months ago
Improving OLTP Data Quality Using Data Warehouse Mechanisms
Research and products for the integration of heterogeneous legacy source databases in data warehousing have addressed numerous data quality problems in or between the sources. Suc...
Matthias Jarke, Christoph Quix, Guido Blees, Dirk ...
136
Voted
COBUILD
1999
Springer
15 years 6 months ago
Complex Construction Kits for Coupled Real and Virtual Engineering Workspaces
A concept of complex objects, being artifacts that have one real physical part and several virtual parts representing certain aspects of the object, is introduced. These parts are ...
Wilhelm F. Bruns
CCR
2004
119views more  CCR 2004»
15 years 2 months ago
Collecting the internet AS-level topology
At the inter-domain level, the Internet topology can be represented by a graph with Autonomous Systems (ASes) as nodes and AS peerings as links. This AS-level topology graph has b...
Beichuan Zhang, Raymond A. Liu, Daniel Massey, Lix...
108
Voted
CAD
1998
Springer
15 years 2 months ago
CAD and the product master model
We develop an architecture for a product master model that federates CAD systems with downstream application processes for di erent feature views that are part of the design proce...
Christoph M. Hoffmann, Robert Joan-Arinyo
WISEC
2010
ACM
15 years 2 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig