Sciweavers

754 search results - page 72 / 151
» Transaction Processing in PRO-MOTION
Sort
View
ISTA
2004
15 years 5 months ago
Where Does Ubiquitous Computing Lead the Organization?
: The paper is concerned with the question of how the emergence of ubiquitous computing influences organizations in terms of changing business processes and social aspects of emplo...
Igor O. Marin
TIP
2008
131views more  TIP 2008»
15 years 4 months ago
Bayesian Foreground and Shadow Detection in Uncertain Frame Rate Surveillance Videos
AND FIGURES OF PAPER PUBLISHED IN IEEE TRANSACTIONS ON IMAGE PROCESSING VOL. 17, NO. 4, 2008 1 Bayesian Foreground and Shadow Detection in Uncertain Frame Rate Surveillance Videos ...
Csaba Benedek, Tamás Szirányi
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
15 years 1 months ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam
ICDE
1999
IEEE
107views Database» more  ICDE 1999»
16 years 5 months ago
Using Codewords to Protect Database Data from a Class of Software Errors
Increasingly, for extensibility and performance, specialpurpose application code is being integrated with database system code. Such application code has direct access to database...
Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abra...
IEAAIE
2009
Springer
15 years 10 months ago
An Efficient Algorithm for Maintaining Frequent Closed Itemsets over Data Stream
Data mining refers to the process of revealing unknown and potentially useful information from a large database. Frequent itemsets mining is one of the foundational problems in dat...
Show-Jane Yen, Yue-Shi Lee, Cheng-Wei Wu, Chin-Lin...