It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
Tattoo images on human body have been routinely collected and used in law enforcement to assist in suspect and victim identification. However, the current practice of matching tat...
Anil K. Jain, Jung-Eun Lee, Rong Jin, Nicholas Gre...
The interactive system which interacts human with computer has been recognized as one direction of computer development for a long time. For example, in cinema, a person gets info...
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
In recent years, the data management community has begun to consider situations in which data access is closely tied to network routing and distributed acquisition: examples includ...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...