Sciweavers

325 search results - page 25 / 65
» A Model of Methods Access Authorization in Object-oriented D...
Sort
View
CORR
2006
Springer
93views Education» more  CORR 2006»
13 years 7 months ago
Constructing experimental indicators for Open Access documents
The ongoing paradigm change in the scholarly publication system (`science is turning to e-science') makes it necessary to construct alternative evaluation criteria/metrics wh...
Philipp Mayr
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 14 days ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
IADIS
2003
13 years 9 months ago
Data Extraction from Web Database Query Result Pages via Tagsets and Integer Sequences
The World Wide Web is a collection of databases as well as web sites. Databases associated with web sites provide public access via query forms on web pages. They constitute an en...
Jerome Robinson
IEEEIAS
2007
IEEE
14 years 1 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
VLDB
2005
ACM
81views Database» more  VLDB 2005»
14 years 1 months ago
Flexible Database Generators
Evaluation and applicability of many database techniques, ranging from access methods, histograms, and optimization strategies to data normalization and mining, crucially depend o...
Nicolas Bruno, Surajit Chaudhuri