Sciweavers

6318 search results - page 1174 / 1264
» Data Leakage Detection
Sort
View
ICDE
2010
IEEE
801views Database» more  ICDE 2010»
16 years 1 months ago
The Similarity Join Database Operator
Similarity joins have been studied as key operations in multiple application domains, e.g., record linkage, data cleaning, multimedia and video applications, and phenomena detectio...
Mohamed H. Ali, Walid G. Aref, Yasin N. Silva
117
Voted
MOBIHOC
2005
ACM
16 years 1 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
RECOMB
2010
Springer
15 years 8 months ago
The Clark Phase-able Sample Size Problem: Long-Range Phasing and Loss of Heterozygosity in GWAS
A phase transition is taking place today. The amount of data generated by genome resequencing technologies is so large that in some cases it is now less expensive to repeat the exp...
Bjarni V. Halldórsson, Derek Aguiar, Ryan T...
TEI
2010
ACM
147views Hardware» more  TEI 2010»
15 years 8 months ago
A robust and accurate 3d hand posture estimation method for interactive systems
In this paper, a new 3D hand posture estimation system using a single camera and 3 interactive systems are introduced. Existing hand gesture recognition systems estimate hand'...
Emi Tamaki
EDBT
2010
ACM
185views Database» more  EDBT 2010»
15 years 8 months ago
Optimizing joins in a map-reduce environment
Implementations of map-reduce are being used to perform many operations on very large data. We examine strategies for joining several relations in the map-reduce environment. Our ...
Foto N. Afrati, Jeffrey D. Ullman
« Prev « First page 1174 / 1264 Last » Next »