Sciweavers

1830 search results - page 262 / 366
» Implementing a Tamper-Evident Database System
Sort
View
130
Voted
SAC
2010
ACM
15 years 29 days ago
TransPeer: adaptive distributed transaction monitoring for Web2.0 applications
In emerging Web2.0 applications such as virtual worlds or social networking websites, the number of users is very important (tens of thousands), hence the amount of data to manage...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
CORR
2000
Springer
120views Education» more  CORR 2000»
15 years 17 days ago
Scaling Up Inductive Logic Programming by Learning from Interpretations
When comparing inductive logic programming (ILP) and attribute-value learning techniques, there is a trade-off between expressive power and efficiency. Inductive logic programming ...
Hendrik Blockeel, Luc De Raedt, Nico Jacobs, Bart ...
109
Voted
IEAAIE
2010
Springer
14 years 10 months ago
Psychophysical Evaluation for a Qualitative Semantic Image Categorisation and Retrieval Approach
This paper details the behavioral evaluation of a qualitative image categorisation and retrieval approach using semantic features of images. Content based image retrieval and class...
Zia Ul-Qayyum, A. G. Cohn, Alexander Klippel
102
Voted
PODS
2007
ACM
109views Database» more  PODS 2007»
16 years 27 days ago
What is "next" in event processing?
Event processing systems have wide applications ranging from managing events from RFID readers to monitoring RSS feeds. Consequently, there exists much work on them in the literat...
Walker M. White, Mirek Riedewald, Johannes Gehrke,...
ICDCS
2006
IEEE
15 years 6 months ago
PRINS: Optimizing Performance of Reliable Internet Storages
Distributed storage systems employ replicas or erasure code to ensure high reliability and availability of data. Such replicas create great amount of network traffic that negative...
Qing Yang, Weijun Xiao, Jin Ren