Sciweavers

1482 search results - page 162 / 297
» Mobile and embedded databases
Sort
View
PR
2006
114views more  PR 2006»
14 years 10 months ago
Orientation feature for fingerprint matching
This paper describes a fingerprint verification algorithm based on the orientation field. The orientation field of a fingerprint image has also been used for image alignment. Area...
Jayant V. Kulkarni, Bhushan D. Patil, Raghunath S....
VLDB
2002
ACM
165views Database» more  VLDB 2002»
14 years 9 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral

Publication
715views
16 years 9 months ago
A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desire...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
15 years 10 months ago
UbiData: Requirements and Architecture for Ubiquitous Data Access
Mobile users today demand ubiquitous access to their data from any mobile device and under variable connection quality. We refer to this requirement as any-time, any-where data ac...
Abdelsalam Helal, Joachim Hammer
MLDM
2007
Springer
15 years 4 months ago
Mining Frequent Trajectories of Moving Objects for Location Prediction
Advances in wireless and mobile technology flood us with amounts of moving object data that preclude all means of manual data processing. The volume of data gathered from position...
Mikolaj Morzy