Sciweavers

1235 search results - page 107 / 247
» Updating a cracked database
Sort
View
VLDB
2004
ACM
93views Database» more  VLDB 2004»
15 years 10 months ago
Symmetric Relations and Cardinality-Bounded Multisets in Database Systems
In a binary symmetric relationship, A is related to B if and only if B is related to A. Symmetric relationships between k participating entities can be represented as multisets of...
Kenneth A. Ross, Julia Stoyanovich
HOTSWUP
2009
ACM
15 years 9 months ago
Automating Database Schema Evolution in Information System Upgrades
The complexity, cost, and down-time currently created by the database schema evolution process is the source of incessant problems in the life of information systems and a major s...
Carlo Curino, Hyun Jin Moon, Carlo Zaniolo
154
Voted
ICIP
2003
IEEE
16 years 6 months ago
Watermarking with knowledge of image database
The goal of this paper is to study how a-prior knowledge of the image database could be exploited for better watermarking performance. Unlike most formulations, where the encoder ...
S. Roy, E.-C. Chang
186
Voted
VLDB
2002
ACM
116views Database» more  VLDB 2002»
15 years 4 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
16 years 6 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...