Sciweavers

3361 search results - page 32 / 673
» An Approach of Performance Evaluation in Authentic Database ...
Sort
View
90
Voted
MCAM
2007
Springer
134views Multimedia» more  MCAM 2007»
15 years 3 months ago
Virtual Community Based Secure Service Discovery and Access for 3D Video Steaming Applications
The Freeband I-Share project aims to define the mechanisms for trust, willingness, resource discovery and sharing mechanisms in virtual communities. To improve the secure and perfo...
Shudong Chen, Igor Radovanovic, Johan Lukkien, Ric...
IDEAS
2003
IEEE
99views Database» more  IDEAS 2003»
15 years 2 months ago
V2: A Database Approach to Temporal Document Management
Temporal document databases are interesting in a number of contexts, in general document databases as well as more specialized applications like temporal XML/Web warehouses. In or...
Kjetil Nørvåg
91
Voted
BIOSIG
2007
170views Biometrics» more  BIOSIG 2007»
14 years 11 months ago
Privacy enhancing technology for a 3D-face recognition system
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 3 months ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...