Sciweavers

108 search results - page 3 / 22
» Continuous authentication on relational streams
Sort
View
ISCC
2006
IEEE
14 years 8 days ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
ISI
2008
Springer
13 years 6 months ago
Towards service-oriented continuous queries in pervasive systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
Yann Gripay, Frédérique Laforest, Je...
DAWAK
2010
Springer
13 years 7 months ago
Experience in Extending Query Engine for Continuous Analytics
: Experience in Extending Query Engine for Continuous Analytics Qiming Chen, Meichun Hsu HP Laboratories HPL-2010-44 In-Database Stream Processing Combining data warehousing and s...
Qiming Chen, Meichun Hsu
IJCV
1998
121views more  IJCV 1998»
13 years 5 months ago
Continuous Time Matching Constraints for Image Streams
Corresponding image points of a rigid object in a discrete sequence of images fulfil the so-called multilinear constraint. In this paper the continuous time analogue of this const...
Kalle Åström, Anders Heyden
BDA
2007
13 years 7 months ago
Towards Action-Oriented Continuous Queries in Pervasive Systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be use...
Yann Gripay, Frédérique Laforest, Je...