Sciweavers

2309 search results - page 192 / 462
» Using Meta-Structures in Database Design
Sort
View
VLDB
2002
ACM
108views Database» more  VLDB 2002»
15 years 2 months ago
Energy-performance trade-offs for spatial access methods on memory-resident data
Abstract. The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious design is important at all levels of syste...
Ning An, Sudhanva Gurumurthi, Anand Sivasubramania...
RSCTC
1998
Springer
175views Fuzzy Logic» more  RSCTC 1998»
15 years 7 months ago
Business Process Understanding: Mining Many Datasets
Abstract. Institutional databases can be instrumental in understanding a business process, but additional data may broaden the empirical perspective on the investigated process. We...
Jan M. Zytkow, Arun P. Sanjeev
134
Voted
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
15 years 8 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon
ERCIMDL
2000
Springer
175views Education» more  ERCIMDL 2000»
15 years 7 months ago
MADILIS, the Microsoft Access-Based Digital Library System
The ASU Libraries' staff had considerable experience creating digital library systems to satisfy the needs of a major university library. These systems were designed to be hig...
Scott Herrington, Philip Konomos
165
Voted
DASFAA
2009
IEEE
253views Database» more  DASFAA 2009»
15 years 6 months ago
Implementing and Optimizing Fine-Granular Lock Management for XML Document Trees
Abstract. Fine-grained lock protocols with lock modes and lock granules adjusted to the various XML processing models, allow for highly concurrent transaction processing on XML tre...
Sebastian Bächle, Theo Härder, Michael P...