Sciweavers

34 search results - page 7 / 7
» delta 2010
Sort
View
MEDIAFORENSICS
2010
13 years 6 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
DASFAA
2010
IEEE
141views Database» more  DASFAA 2010»
14 years 9 days ago
Optimizing Write Performance for Read Optimized Databases
Compression in column-oriented databases has been proven to offer both performance enhancements and reductions in storage consumption. This is especially true for read access as c...
Jens Krüger, Martin Grund, Christian Tinnefel...
MA
2010
Springer
153views Communications» more  MA 2010»
13 years 3 months ago
Testing quasi-independence for truncation data
Quasi-independence is a common assumption for analyzing truncated data. To verify this condition, we consider a class of weighted log-rank type statistics that include existing te...
Takeshi Emura, Weijing Wang
TPDS
2010
199views more  TPDS 2010»
13 years 3 months ago
Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
—One of the major applications of wireless ad hoc networks is to extend the Internet coverage and support pervasive and efficient data dissemination and sharing. To reduce data a...
Yu Huang 0002, Jiannong Cao, Beihong Jin, XianPing...