Sciweavers

1830 search results - page 266 / 366
» Implementing a Tamper-Evident Database System
Sort
View
81
Voted
IJCAI
2003
15 years 2 months ago
Boosting Face Identification in Airports
Robust face identification system in complex airport environment, which can identify certain candidates from a crowd of people in real time, is in urgent demand. S-AdaBoost is dis...
Jimmy Jiang Liu, Kia-Fock Loe
107
Voted
COMPUTER
1998
131views more  COMPUTER 1998»
15 years 13 days ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa
VLDB
2002
ACM
114views Database» more  VLDB 2002»
15 years 11 days ago
Tree Pattern Aggregation for Scalable XML Data Dissemination
With the rapid growth of XML-document traffic on the Internet, scalable content-based dissemination of XML documents to a large, dynamic group of consumers has become an important...
Chee Yong Chan, Wenfei Fan, Pascal Felber, Minos N...
109
Voted
HICSS
2011
IEEE
157views Biometrics» more  HICSS 2011»
14 years 4 months ago
Reusing Relational Queries for Intuitive Decision Optimization
— Decision optimization is used in many applications such as those for finding the best course of action in emergencies. However, optimization solutions require considerable mat...
Alexander Brodsky, Nathan E. Egge, Xiaoyang Sean W...
ICDE
2007
IEEE
122views Database» more  ICDE 2007»
16 years 2 months ago
Group Linkage
Poor quality data is prevalent in databases due to a variety of reasons, including transcription errors, lack of standards for recording database fields, etc. To be able to query ...
Byung-Won On, Nick Koudas, Dongwon Lee, Divesh Sri...