Sciweavers

2309 search results - page 358 / 462
» Using Meta-Structures in Database Design
Sort
View
JCDL
2009
ACM
130views Education» more  JCDL 2009»
15 years 11 months ago
Whetting the appetite of scientists: producing summaries tailored to the citation context
The amount of scientific material available electronically is forever increasing. This makes reading the published literature, whether to stay up-to-date on a topic or to get up ...
Stephen Wan, Cécile Paris, Robert Dale
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 10 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
ISSTA
2006
ACM
15 years 10 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
GROUP
2005
ACM
15 years 10 months ago
An optimization approach to group coupling in heterogeneous collaborative systems
Recent proliferation of computing devices has brought attention to heterogeneous collaborative systems, where key challenges arise from the resource limitations and disparities. S...
Carlos D. Correa, Ivan Marsic
ICDT
2005
ACM
88views Database» more  ICDT 2005»
15 years 10 months ago
When Is Nearest Neighbors Indexable?
Abstract. In this paper, we consider whether traditional index structures are effective in processing unstable nearest neighbors workloads. It is known that under broad conditions...
Uri Shaft, Raghu Ramakrishnan