Sciweavers

5600 search results - page 926 / 1120
» Synthesizing robust systems
Sort
View
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
16 years 5 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
PODS
2006
ACM
96views Database» more  PODS 2006»
16 years 5 months ago
Efficient gossip-based aggregate computation
Recently, there has been a growing interest in gossip-based protocols that employ randomized communication to ensure robust information dissemination. In this paper, we present a ...
Srinivas R. Kashyap, Supratim Deb, K. V. M. Naidu,...
EDBT
2006
ACM
194views Database» more  EDBT 2006»
16 years 5 months ago
Hermes - A Framework for Location-Based Data Management
The aim of this paper is to demonstrate Hermes, a robust framework capable of aiding a spatio-temporal database developer in modeling, constructing and querying a database with dyn...
Nikos Pelekis, Yannis Theodoridis, Spyros Vosinaki...
ICIAP
2007
ACM
16 years 5 months ago
Appearance-based 3D object recognition with time-invariant features
In this paper we explore the interlink between temporally dense view-based object recognition and sparse image representations with local keypoints. The temporal component is an a...
Elisabetta Delponte, Nicoletta Noceti, Francesca O...
ICSE
2007
IEEE-ACM
16 years 5 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard