Sciweavers

1494 search results - page 86 / 299
» Efficient provenance storage
Sort
View
CCS
2006
ACM
15 years 3 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
ICCV
2009
IEEE
16 years 4 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
ICDE
2007
IEEE
206views Database» more  ICDE 2007»
16 years 1 months ago
Efficiently Processing Continuous k-NN Queries on Data Streams
Efficiently processing continuous k-nearest neighbor queries on data streams is important in many application domains, e. g. for network intrusion detection or in querysubscriber ...
Beng Chin Ooi, Christian Böhm, Claudia Plant,...
ICDE
2005
IEEE
175views Database» more  ICDE 2005»
16 years 1 months ago
BOXes: Efficient Maintenance of Order-Based Labeling for Dynamic XML Data
Order-based element labeling for tree-structured XML data is an important technique in XML processing. It lies at the core of many fundamental XML operations such as containment j...
Adam Silberstein, Hao He, Jun Yang 0001, Ke Yi
WWW
2001
ACM
16 years 16 days ago
Algorithms and programming models for efficient representation of XML for Internet applications
XML is poised to take the World-Wide-Web to the next level of innovation. XML data, large or small, with or without associated schema, will be exchanged between increasing number ...
Neel Sundaresan, Reshad Moussa