Sciweavers

1830 search results - page 295 / 366
» Implementing a Tamper-Evident Database System
Sort
View
111
Voted
IADIS
2003
15 years 2 months ago
Bridging Method for Integration the UPNP Domain and the Legacy SNMP Domain
As the UPnP devices and control points have been widely deployed, users intended to access the legacy internet-enabled devices with the UPnP control point. In this paper, we prese...
Pusik Park, KiTaeg Lim, KwangHo Choi
IDA
2006
Springer
15 years 20 days ago
Classification of symbolic objects: A lazy learning approach
Symbolic data analysis aims at generalizing some standard statistical data mining methods, such as those developed for classification tasks, to the case of symbolic objects (SOs). ...
Annalisa Appice, Claudia d'Amato, Floriana Esposit...
99
Voted
JIB
2007
121views more  JIB 2007»
15 years 17 days ago
MetHouse: Raw and Preprocessed Mass Spectrometry Data
We are developing a vendor-independent archive and on top of that a data warehouse for mass spectrometry metabolomics data. The archive schema resembles the communitydeveloped obj...
Antje Gaida, Steffen Neumann
PR
2006
117views more  PR 2006»
15 years 17 days ago
On transforming statistical models for non-frontal face verification
: We address the pose mismatch problem which can occur in face verification systems that have only a single (frontal) face image available for training. In the framework of a Bayes...
Conrad Sanderson, Samy Bengio, Yongsheng Gao
119
Voted
ICDE
2010
IEEE
288views Database» more  ICDE 2010»
16 years 12 days ago
Fast In-Memory XPath Search using Compressed Indexes
A large fraction of an XML document typically consists of text data. The XPath query language allows text search via the equal, contains, and starts-with predicates. Such predicate...
Diego Arroyuelo, Francisco Claude, Sebastian Manet...