Sciweavers

108 search results - page 3 / 22
» Continuous authentication on relational streams
Sort
View
ISCC
2006
IEEE
15 years 3 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
ISI
2008
Springer
14 years 9 months ago
Towards service-oriented continuous queries in pervasive systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
Yann Gripay, Frédérique Laforest, Je...
92
Voted
DAWAK
2010
Springer
14 years 10 months ago
Experience in Extending Query Engine for Continuous Analytics
: Experience in Extending Query Engine for Continuous Analytics Qiming Chen, Meichun Hsu HP Laboratories HPL-2010-44 In-Database Stream Processing Combining data warehousing and s...
Qiming Chen, Meichun Hsu
IJCV
1998
121views more  IJCV 1998»
14 years 9 months ago
Continuous Time Matching Constraints for Image Streams
Corresponding image points of a rigid object in a discrete sequence of images fulfil the so-called multilinear constraint. In this paper the continuous time analogue of this const...
Kalle Åström, Anders Heyden
BDA
2007
14 years 11 months ago
Towards Action-Oriented Continuous Queries in Pervasive Systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be use...
Yann Gripay, Frédérique Laforest, Je...