Sciweavers

1391 search results - page 69 / 279
» Ensuring data integrity in storage: techniques and applicati...
Sort
View
KAIS
2008
112views more  KAIS 2008»
14 years 11 months ago
A hybrid aggregation and compression technique for road network databases
Abstract Vector data and in particular road networks are being queried, hosted and processed in many application domains such as in mobile computing. Many client systems such as PD...
Ali Khoshgozaran, Ali Khodaei, Mehdi Sharifzadeh, ...
ICDM
2007
IEEE
95views Data Mining» more  ICDM 2007»
15 years 6 months ago
Incremental Quantization for Aging Data Streams
A growing number of applications have become reliant or can benefit from monitoring data streams. Data streams are potentially unbounded in size, hence, Data Stream Management Sy...
Fatih Altiparmak, David Chiu, Hakan Ferhatosmanogl...
ICIP
2009
IEEE
14 years 9 months ago
3D facial visualization through adaptive spread spectrum synchronous scalable (A4S) data hiding
An adaptive spread spectrum synchronous scalable(A4S) data hiding strategy is being put forward to integrate the disparate 3D facial visualization data, into a single JPEG2000 for...
Khizar Hayat, William Puech, Gilles Gesquiè...
DKE
2008
158views more  DKE 2008»
14 years 12 months ago
Integration and verification of semantic constraints in adaptive process management systems
Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary ...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
SSDBM
2010
IEEE
166views Database» more  SSDBM 2010»
15 years 4 months ago
Bridging Workflow and Data Provenance Using Strong Links
Abstract. As scientists continue to migrate their work to computational methods, it is important to track not only the steps involved in the computation but also the data consumed ...
David Koop, Emanuele Santos, Bela Bauer, Matthias ...