Sciweavers

6846 search results - page 1281 / 1370
» Querying a summary of database
Sort
View
DCC
2008
IEEE
15 years 4 months ago
Shared Descriptions Fusion Coding for Storage and Selective Retrieval of Correlated Sources
Motivated by sensor networks, we consider the fusion storage of correlated sources in a database, such that any subset of them may be efficiently retrieved in the future. Only st...
Sharadh Ramaswamy, Kenneth Rose
GLOBECOM
2008
IEEE
15 years 4 months ago
A Memory-Optimized Bloom Filter Using an Additional Hashing Function
— A Bloom filter is a simple space-efficient randomized data structure for the representation set of items in order to support membership queries. In recent years, Bloom filte...
Mahmood Ahmadi, Stephan Wong
ICPR
2008
IEEE
15 years 4 months ago
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent as...
Jinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam
TOOLS
2008
IEEE
15 years 4 months ago
Guarded Program Transformations Using JTL
There is a growing research interest in employing the logic paradigm for making queries on software in general, and OOP software in particular. We describes a side-effect-free tech...
Tal Cohen, Joseph Gil, Itay Maman
COMPSAC
2007
IEEE
15 years 4 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
« Prev « First page 1281 / 1370 Last » Next »