Sciweavers

1215 search results - page 143 / 243
» CBIR in Distributed Databases using a Multi-Agent System
Sort
View
99
Voted
PVLDB
2008
100views more  PVLDB 2008»
15 years 5 days ago
Scalable query result caching for web applications
The backend database system is often the performance bottleneck when running web applications. A common approach to scale the database component is query result caching, but it fa...
Charles Garrod, Amit Manjhi, Anastasia Ailamaki, B...
124
Voted
SIGMOD
2010
ACM
145views Database» more  SIGMOD 2010»
14 years 11 months ago
How to ConQueR why-not questions
One useful feature that is missing from today’s database systems is an explain capability that enables users to seek clarifications on unexpected query results. There are two t...
Quoc Trung Tran, Chee-Yong Chan
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 7 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
ECOWS
2006
Springer
15 years 4 months ago
Design Patterns for Wrapping Similar Legacy Systems with Common Service Interfaces
Web Services are increasingly being used to create a wide range of distributed systems, many of which involve legacy software. Developing service interfaces for these legacy syste...
David E. Millard, Yvonne Margaret Howard, Swapna C...
PR
2010
141views more  PR 2010»
14 years 7 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...