Sciweavers

1830 search results - page 283 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2003
IEEE
101views Database» more  ICDE 2003»
16 years 2 months ago
XomatiQ: Living With Genomes, Proteomes, Relations and a Little Bit of XML
In this paper, we describe a system called XomatiQ to address the problem of integration, querying and correlation of biological data. XomatiQ is an integral part of the genomics ...
Sourav S. Bhowmick, Pedro Cruz, Amey V. Laud
ICDE
2000
IEEE
121views Database» more  ICDE 2000»
16 years 2 months ago
Creating a Customized Access Method for Blobworld
We present the design and analysis of a customized access method for the content-based image retrieval system, Blobworld. Using the amdb access method analysis tool, we analyzed t...
Megan Thomas, Chad Carson, Joseph M. Hellerstein
206
Voted
ICDE
1997
IEEE
136views Database» more  ICDE 1997»
16 years 2 months ago
Delegation: Efficiently Rewriting History
Transaction delegation, as introduced in ACTA, allows a transaction to transfer responsibility for the operations that it has performed on an object to another transaction. Delega...
Cris Pedregal Martin, Krithi Ramamritham
92
Voted
ICIP
2009
IEEE
16 years 1 months ago
Palmprint Verification Using Consistent Orientation Coding
Developing accurate and robust palmprint verification algorithms is one of the key issues in automatic palmprint recognition systems. Recently, orientation based coding algorithms...
125
Voted
WWW
2008
ACM
16 years 1 months ago
Information retrieval and knowledge discovery on the semantic web of traditional chinese medicine
We conduct the first systematical adoption of the Semantic Web solution in the integration, management, and utilization of TCM information and knowledge resources. As the results,...
Zhaohui Wu, Tong Yu, Huajun Chen, Xiaohong Jiang, ...