Sciweavers

2956 search results - page 506 / 592
» Databases and Higher Types
Sort
View
AMINING
2003
Springer
293views Data Mining» more  AMINING 2003»
15 years 3 months ago
Data Mining Oriented CRM Systems Based on MUSASHI: C-MUSASHI
Abstract. MUSASHI is a set of commands which enables us to efficiently execute various types of data manipulations in a flexible manner, mainly aiming at data processing of huge a...
Katsutoshi Yada, Yukinobu Hamuro, Naoki Katoh, Tak...
AVBPA
2003
Springer
158views Biometrics» more  AVBPA 2003»
15 years 3 months ago
A Novel Method to Extract Features for Iris Recognition System
In general, the iris recognition systems have used the wavelet transform as feature extraction techniques. Since the wavelet transform does not have the shift-invariant property, t...
Seung-In Noh, Kwanghyuk Bae, Yeunggyu Park, Jaihie...
COSIT
2003
Springer
94views GIS» more  COSIT 2003»
15 years 3 months ago
Testing the First Law of Cognitive Geography on Point-Display Spatializations
Abstract. Spatializations are computer visualizations in which nonspatial information is depicted spatially. Spatializations of large databases commonly use distance as a metaphor ...
Daniel R. Montello, Sara Irina Fabrikant, Marco Ru...
EDBT
2010
ACM
138views Database» more  EDBT 2010»
15 years 2 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
MDM
2010
Springer
301views Communications» more  MDM 2010»
15 years 2 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...