Sciweavers

889 search results - page 94 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
ICDE
2002
IEEE
209views Database» more  ICDE 2002»
16 years 6 months ago
Geometric-Similarity Retrieval in Large Image Bases
We propose a novel approach to shape-based image retrieval that builds upon a similarity criterion which is based on the average point set distance. Compared to traditional techni...
Ioannis Fudos, Leonidas Palios, Evaggelia Pitoura
ICANN
2005
Springer
15 years 10 months ago
Fast Color-Based Object Recognition Independent of Position and Orientation
Small mobile robots typically have little on-board processing power for time-consuming vision algorithms. Here we show how they can quickly extract very dense yet highly useful inf...
Martijn van de Giessen, Jürgen Schmidhuber
ICSM
2002
IEEE
15 years 10 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
MOBIDE
2009
ACM
15 years 11 months ago
Toward context and preference-aware location-based services
The explosive growth of location-detection devices, wireless communications, and mobile databases has resulted in the realization of location-based services as commercial products...
Mohamed F. Mokbel, Justin J. Levandoski
ER
1999
Springer
155views Database» more  ER 1999»
15 years 9 months ago
Detecting Redundancy in Data Warehouse Evolution
A Data Warehouse DW can be abstractly seen as a set of materialized views de ned over a set of remote data sources. A DW is intended to satisfy a set of queries. The views materi...
Dimitri Theodoratos