Sciweavers

889 search results - page 161 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
86
Voted
DMSN
2005
ACM
14 years 11 months ago
Zone sharing: a hot-spots decomposition scheme for data-centric storage in sensor networks
In the resource over-constrained environment of sensor networks, techniques for storing data locally in sensor nodes have been proposed to support efficient processing of adhoc qu...
Mohamed Aly, Nicholas Morsillo, Panos K. Chrysanth...
CIKM
2008
Springer
14 years 11 months ago
Transaction reordering with application to synchronized scans
Traditional workload management methods mainly focus on the current system status while information about the interaction between queued and running transactions is largely ignore...
Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, Mi...
SIGMOD
2004
ACM
149views Database» more  SIGMOD 2004»
15 years 9 months ago
Incremental Maintenance of XML Structural Indexes
Increasing popularity of XML in recent years has generated much interest in query processing over graph-structured data. To support efficient evaluation of path expressions, many ...
Ke Yi, Hao He, Ioana Stanoi, Jun Yang 0001
BMCBI
2006
109views more  BMCBI 2006»
14 years 9 months ago
A computational approach to discovering the functions of bacterial phytochromes by analysis of homolog distributions
Background: Phytochromes are photoreceptors, discovered in plants, that control a wide variety of developmental processes. They have also been found in bacteria and fungi, but for...
Tilman Lamparter
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
15 years 2 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari