Sciweavers

662 search results - page 104 / 133
» A comparative benchmark of large objects in relational datab...
Sort
View
PSD
2004
Springer
126views Database» more  PSD 2004»
14 years 29 days ago
Outlier Protection in Continuous Microdata Masking
Abstract. Masking methods protect data sets against disclosure by perturbing the original values before publication. Masking causes some information loss (masked data are not exact...
Josep Maria Mateo-Sanz, Francesc Sebé, Jose...
MICCAI
2001
Springer
14 years 2 days ago
Retrospective Evaluation of Inter-subject Brain Registration
Although numerous methods to register brains of different individuals have been proposed, no work has been done, as far as we know, to evaluate and compare objectively the performa...
Pierre Hellier, Christian Barillot, Isabelle Corou...
EDBT
2010
ACM
202views Database» more  EDBT 2010»
14 years 2 months ago
Querying trajectories using flexible patterns
The wide adaptation of GPS and cellular technologies has created many applications that collect and maintain large repositories of data in the form of trajectories. Previous work ...
Marcos R. Vieira, Petko Bakalov, Vassilis J. Tsotr...
ICDE
1996
IEEE
157views Database» more  ICDE 1996»
14 years 9 months ago
High Availability in Clustered Multimedia Servers
Clustered multimedia servers, consisting of interconnected nodes and disks, have been proposed for large scale servers, that are capable of supporting multiple concurrent streams ...
Renu Tewari, Daniel M. Dias, Rajat Mukherjee, Harr...
ADC
2009
Springer
151views Database» more  ADC 2009»
13 years 11 months ago
Unified Q-ary Tree for RFID Tag Anti-Collision Resolution
Radio Frequency Identification (RFID) technology uses radio-frequency waves to automatically identify people or objects. A large volume of data, resulting from the fast capturing ...
Prapassara Pupunwiwat, Bela Stantic