Sciweavers

1335 search results - page 247 / 267
» Privacy in Database Publishing
Sort
View
CVPR
2011
IEEE
1838views Computer Vision» more  CVPR 2011»
14 years 9 months ago
Reconstructing an image from its local descriptors
This paper shows that an image can be approximately reconstructed based on the output of a blackbox local description software such as those classically used for image indexing. Ou...
Philippe Weinzaepfel, Hervé Jégou and Patrick Pe...
BMCBI
2007
116views more  BMCBI 2007»
14 years 12 months ago
Cloning, analysis and functional annotation of expressed sequence tags from the Earthworm Eisenia fetida
Background: Eisenia fetida, commonly known as red wiggler or compost worm, belongs to the Lumbricidae family of the Annelida phylum. Little is known about its genome sequence alth...
Mehdi Pirooznia, Ping Gong, Xin Guan, Laura S. Ino...
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
16 years 1 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...
ICDE
2007
IEEE
162views Database» more  ICDE 2007»
16 years 1 months ago
On Density Based Transforms for Uncertain Data Mining
In spite of the great progress in the data mining field in recent years, the problem of missing and uncertain data has remained a great challenge for data mining algorithms. Many ...
Charu C. Aggarwal
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
16 years 11 days ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...