Sciweavers

889 search results - page 153 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
CIKM
2005
Springer
15 years 3 months ago
QED: a novel quaternary encoding to completely avoid re-labeling in XML updates
The method of assigning labels to the nodes of the XML tree is called a labeling scheme. Based on the labels only, both ordered and un-ordered queries can be processed without acc...
Changqing Li, Tok Wang Ling
TCSV
2008
150views more  TCSV 2008»
14 years 9 months ago
Robust Video Fingerprinting for Content-Based Video Identification
Video fingerprints are feature vectors that uniquely characterize one video clip from another. The goal of video fingerprinting is to identify a given video query in a database (DB...
Sunil Lee, Chang Dong Yoo
CCS
2005
ACM
15 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
ICDE
2010
IEEE
283views Database» more  ICDE 2010»
15 years 9 months ago
Personalized Web Search with Location Preferences
As the amount of Web information grows rapidly, search engines must be able to retrieve information according to the user's preference. In this paper, we propose a new web sea...
Kenneth Wai-Ting Leung, Dik Lun Lee, Wang-Chien Le...
SIGMOD
2003
ACM
152views Database» more  SIGMOD 2003»
15 years 9 months ago
Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects
In modern application domains such as multimedia, molecular biology and medical imaging, similarity search in database systems is becoming an increasingly important task. Especial...
Hans-Peter Kriegel, Stefan Brecheisen, Peer Kr&oum...