Sciweavers

5600 search results - page 926 / 1120
» Synthesizing robust systems
Sort
View
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
16 years 29 days ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
PODS
2006
ACM
96views Database» more  PODS 2006»
16 years 28 days ago
Efficient gossip-based aggregate computation
Recently, there has been a growing interest in gossip-based protocols that employ randomized communication to ensure robust information dissemination. In this paper, we present a ...
Srinivas R. Kashyap, Supratim Deb, K. V. M. Naidu,...
111
Voted
EDBT
2006
ACM
194views Database» more  EDBT 2006»
16 years 28 days ago
Hermes - A Framework for Location-Based Data Management
The aim of this paper is to demonstrate Hermes, a robust framework capable of aiding a spatio-temporal database developer in modeling, constructing and querying a database with dyn...
Nikos Pelekis, Yannis Theodoridis, Spyros Vosinaki...
ICIAP
2007
ACM
16 years 28 days ago
Appearance-based 3D object recognition with time-invariant features
In this paper we explore the interlink between temporally dense view-based object recognition and sparse image representations with local keypoints. The temporal component is an a...
Elisabetta Delponte, Nicoletta Noceti, Francesca O...
96
Voted
ICSE
2007
IEEE-ACM
16 years 27 days ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard