Sciweavers

6094 search results - page 169 / 1219
» Applications of a Color-Naming Database
Sort
View
ICICS
2009
Springer
15 years 11 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
CIVR
2007
Springer
126views Image Analysis» more  CIVR 2007»
15 years 11 months ago
Image annotation: which approach for realistic databases?
This paper describes an efficient approach to image annotation. It ranked first on the recent scene categorization track of the ImagEVAL1 benchmark. We show how homogeneous globa...
Nicolas Hervé, Nozha Boujemaa
NCA
2006
IEEE
15 years 10 months ago
A Primary-Backup Protocol for In-Memory Database Replication
The paper presents a primary-backup protocol to manage replicated in-memory database systems (IMDBs). The protocol exploits two features of IMDBs: coarse-grain concurrency control...
Lásaro J. Camargos, Fernando Pedone, Rodrig...
NCA
2006
IEEE
15 years 10 months ago
A Flexible Replication Mechanism with Extended Database Connection Layers
It is vital to achieve a disaster recovery system that allows a backup site to take over a primary site’s IT services while the primary site is down. We propose a flexible repli...
Nobutatsu Nakamura, Ken-ichiro Fujiyama, Eiji Kawa...
ADVIS
2006
Springer
15 years 10 months ago
Checking Violation Tolerance of Approaches to Database Integrity
A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption ...
Hendrik Decker, Davide Martinenghi