Sciweavers

3524 search results - page 196 / 705
» Issues in Active Databases
Sort
View
INFOCOM
2000
IEEE
15 years 8 months ago
Virtual Backbone Generation and Maintenance in Ad Hoc Network Mobility Management
Abstract—In this paper, we present the implementation issues of a virtual backbone that supports the operations of the Uniform Quorum System (UQS) and the Randomized Database Gro...
Ben Liang, Zygmunt J. Haas
CSCW
1996
ACM
15 years 8 months ago
Talking to Strangers: An Evaluation of the Factors Affecting Electronic Collaboration
This empirical study examines factors influencing the success of a commercial groupware system in creating group archives and supporting asynchronous communication. The study inve...
Steve Whittaker
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
16 years 4 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
CVPR
1997
IEEE
15 years 8 months ago
The FERET Evaluation Methodology for Face-Recognition Algorithms
Two of the most critical requirementsin support of producing reliableface-recognition systems are a large database of facial images and a testing procedure to evaluate systems. Th...
P. Jonathon Phillips, Hyeonjoon Moon, Patrick J. R...
138
Voted
VLDB
1997
ACM
94views Database» more  VLDB 1997»
15 years 8 months ago
To Weave the Web
The paper discusses the issue of views in the Web context. We introduce a set of languages for managing and restructuring data coming from the World Wide Web. We present a specifi...
Paolo Atzeni, Giansalvatore Mecca, Paolo Merialdo