Sciweavers

1830 search results - page 317 / 366
» Implementing a Tamper-Evident Database System
Sort
View
138
Voted
IFIP
2005
Springer
15 years 6 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...
122
Voted
WEBDB
2004
Springer
122views Database» more  WEBDB 2004»
15 years 6 months ago
Querying Bi-level Information
In our research on superimposed information management, we have developed applications where information elements in the superimposed layer serve to annotate, comment, restructure...
Sudarshan Murthy, David Maier, Lois M. L. Delcambr...
INFOVIS
2003
IEEE
15 years 5 months ago
Exploring High-D Spaces with Multiform Matrices and Small Multiples
We introduce an approach to visual analysis of multivariate data that integrates several methods from information visualization, exploratory data analysis (EDA), and geovisualizat...
Alan M. MacEachren, Xiping Dai, Frank Hardisty, Di...
ADBIS
2000
Springer
188views Database» more  ADBIS 2000»
15 years 5 months ago
Algorithms for Rewriting Aggregate Queries Using Views
Queries involving aggregation are typical in a number of database research areas, such as data warehousing, global information systems and mobile computing. One of the main ideas ...
Sara Cohen, Werner Nutt, Alexander Serebrenik
104
Voted
VLDB
1995
ACM
89views Database» more  VLDB 1995»
15 years 4 months ago
OODB Bulk Loading Revisited: The Partitioned-List Approach
Object-oriented and object-relational databases(OODB) need to be able to load the vast quantities of data that OODB users bring to them. Loading OODB datais significantly more com...
Janet L. Wiener, Jeffrey F. Naughton