Sciweavers

2421 search results - page 1 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
GPC
2009
Springer
13 years 2 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
SSD
2009
Springer
193views Database» more  SSD 2009»
13 years 11 months ago
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the populari...
Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
GW
2005
Springer
173views Biometrics» more  GW 2005»
13 years 10 months ago
Deixis: How to Determine Demonstrated Objects Using a Pointing Cone
Abstract. We present an collaborative approach towards a detailed understanding of the usage of pointing gestures accompanying referring expressions. This effort is undertaken in t...
Alfred Kranstedt, Andy Lücking, Thies Pfeiffe...
AICT
2005
IEEE
146views Communications» more  AICT 2005»
13 years 10 months ago
A Framework for Service Quality Assurance Using Event Correlation Techniques
Due to the increasing use of service level agreements for the provisioning of IT services, providers have to ensure that the guarantees for the quality of their offered services, ...
Andreas Hanemann, Martin Sailer