Sciweavers

1830 search results - page 265 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ACSAC
2003
IEEE
15 years 4 months ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
121
Voted
CHI
1995
ACM
15 years 4 months ago
LyberWorld: a 3D graphical user interface for fulltext retrieval
ld is a prototype IR user interface. It implements visualizations of an abstract information space – fulltext. The presentation demonstrates a visual user interface for the prob...
Matthias Hemmje
84
Voted
NIPS
2007
15 years 2 months ago
Subspace-Based Face Recognition in Analog VLSI
We describe an analog-VLSI neural network for face recognition based on subspace methods. The system uses a dimensionality-reduction network whose coefficients can be either progr...
Gonzalo Carvajal, Waldo Valenzuela, Miguel Figuero...
CASCON
2006
136views Education» more  CASCON 2006»
15 years 2 months ago
Workload adaptation in autonomic DBMSs
Workload adaptation is a performance management process in which an autonomic database management system (DBMS) efficiently makes use of its resources by filtering or controlling ...
Baoning Niu, Patrick Martin, Wendy Powley, Randy H...
DIWEB
2004
15 years 2 months ago
Supporting Efficient Streaming and Insertion of XML Data in RDBMS
Relational database systems are increasingly used to manage XML documents, especially for data-centric XML. In this paper we present a new approach to efficiently manage document-c...
Timo Böhme, Erhard Rahm