Sciweavers

1457 search results - page 141 / 292
» Privacy Challenges for Database Systems
Sort
View
DBISP2P
2006
Springer
185views Database» more  DBISP2P 2006»
15 years 7 months ago
Answering Constrained k-NN Queries in Unstructured P2P Systems
The processing of k-NN queries has been studied extensively both in a centralized computing environment and in a structured P2P environment. However, the problem over an unstructur...
Bin Wang, Xiaochun Yang, Guoren Wang, Lei Chen 000...
PRL
2007
180views more  PRL 2007»
15 years 3 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
SIGMOD
2008
ACM
85views Database» more  SIGMOD 2008»
16 years 4 months ago
The ORCHESTRA Collaborative Data Sharing System
Sharing structured data today requires standardizing upon a single schema, then mapping and cleaning all of the data. This results in a single queriable mediated data instance. Ho...
Zachary G. Ives, Todd J. Green, Grigoris Karvounar...
ER
2008
Springer
117views Database» more  ER 2008»
15 years 5 months ago
On the Formal Semantics of Change Patterns in Process-Aware Information Systems
Due to a turbulent market enterprises should be able to adapt their business processes in a quick and flexible way. This requires adaptive process-aware information systems (PAISs)...
Stefanie Rinderle-Ma, Manfred Reichert, Barbara We...
ACSC
2010
IEEE
14 years 11 months ago
Measuring visual consistency in 3d rendering systems
One of the major challenges facing a present day game development company is the removal of bugs from such complex virtual environments. This work presents an approach for measuri...
Alfredo Nantes, Ross Brown, Frédéric...