Sciweavers

2386 search results - page 79 / 478
» Database Security 2000
Sort
View
VLDB
2000
ACM
149views Database» more  VLDB 2000»
15 years 1 months ago
Rethinking Database System Architecture: Towards a Self-Tuning RISC-Style Database System
Database technology is one of the cornerstones for the new millennium's IT landscape. However, database systems as a unit of code packaging and deployment are at a crossroad:...
Surajit Chaudhuri, Gerhard Weikum
PAMI
2000
96views more  PAMI 2000»
14 years 9 months ago
Shape Similarity Measure Based on Correspondence of Visual Parts
Longin Jan Latecki, Rolf Lakämper
FGR
2002
IEEE
1757views Biometrics» more  FGR 2002»
15 years 2 months ago
The CMU Pose, Illumination, and Expression (PIE) Database
Between October 2000 and December 2000 we collected a database of over 40,000 facial images of 68 people. Using the CMU 3D Room we imaged each person across 13 different poses, un...
Terence Sim, Simon Baker, Maan Bsat
BNCOD
2006
85views Database» more  BNCOD 2006»
14 years 11 months ago
Trust Obstacle Mitigation for Database Systems
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
15 years 11 months ago
Privacy-Preserving Singular Value Decomposition
Abstract-- In this paper, we propose secure protocols to perform Singular Value Decomposition (SVD) for two parties over horizontally and vertically partitioned data. We propose va...
Shuguo Han, Wee Keong Ng, Philip S. Yu