Sciweavers

641 search results - page 97 / 129
» Massive-Scale Data Management using Standards-Based Solution...
Sort
View
CCS
2009
ACM
15 years 4 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
IC
2003
15 years 1 months ago
An Architecture for Efficient, Flexible Enterprise System Integration
Integrating complex enterprise systems is challenging and reliability and performance of the integrated systems can be problematic when using typical solutions of distributed tran...
John C. Grundy, Jun Bai, John Blackham, John G. Ho...
DMIN
2006
146views Data Mining» more  DMIN 2006»
15 years 1 months ago
A Comparison of Two Document Clustering Approaches for Clustering Medical Documents
Medical data is often presented as free text in the form of medical reports. Such documents contain important information about patients, disease progression and management, but ar...
Fathi H. Saad, Beatriz de la Iglesia, Duncan G. Be...
KDD
2008
ACM
116views Data Mining» more  KDD 2008»
16 years 6 days ago
Volatile correlation computation: a checkpoint view
Recent years have witnessed increased interest in computing strongly correlated pairs in very large databases. Most previous studies have been focused on static data sets. However...
Wenjun Zhou, Hui Xiong
ICDE
2008
IEEE
142views Database» more  ICDE 2008»
16 years 1 months ago
A Motion-Aware Approach to Continuous Retrieval of 3D Objects
Abstract-- With recent advances in mobile computing technologies, mobile devices can now render 3D objects realistically. Many users of these devices such as tourists, mixed-realit...
Mohammed Eunus Ali, Rui Zhang, Egemen Tanin, Lars ...