Sciweavers

1413 search results - page 259 / 283
» Mining Multiple Large Databases
Sort
View
121
Voted
HASE
2008
IEEE
15 years 6 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
ICIP
2008
IEEE
15 years 6 months ago
Model-based compression of nonstationary landmark shape sequences
We have proposed a novel model-based compression technique for nonstationary landmark shape data extracted from video sequences. The main goal is to develop a technique for the co...
Samarjit Das, Namrata Vaswani
IPPS
2008
IEEE
15 years 6 months ago
SWAMP: Smith-Waterman using associative massive parallelism
One of the most commonly used tools by computational biologists is some form of sequence alignment. Heuristic alignment algorithms developed for speed and their multiple results s...
Shannon Steinfadt, Johnnie W. Baker
WACV
2008
IEEE
15 years 6 months ago
Mosaicfaces: a discrete representation for face recognition
Most face recognition algorithms use a “distancebased” approach: gallery and probe images are projected into a low dimensional feature space and decisions about matching are b...
Jania Aghajanian, Simon J. D. Prince
EXPDB
2006
ACM
15 years 5 months ago
Performance Study of Rollout for Multi Dimensional Clustered Tables in DB2
In data warehousing applications, the ability to efficiently delete large chunks of data from a table is very important. This feature is also known as Rollout. Rollout is generall...
Bishwaranjan Bhattacharjee