Sciweavers

274 search results - page 15 / 55
» Ad-hoc data processing in the cloud
Sort
View
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
14 years 1 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
CVPR
2005
IEEE
14 years 9 months ago
Learning Feature Distance Measures for Image Correspondences
Standard but ad hoc measures such as sum-of-squared pixel differences (SSD) are often used when comparing and registering two images that have not been previously observed before....
Xi Chen, Tat-Jen Cham
AINA
2007
IEEE
14 years 1 months ago
Fuzzy Logic-Based Event Notification in Sparse MANETs
In the Ad-Hoc InfoWare project, we develop a delay tolerant event notification service for sparse Mobile Ad-Hoc Networks for emergency and rescue operations. In most event notific...
Anna K. Lekova, Katrine Stemland Skjelsvik, Thomas...
ADC
2007
Springer
125views Database» more  ADC 2007»
14 years 1 months ago
Building a Disordered Protein Database: A Case Study in Managing Biological Data
A huge diversity of biological databases is available via the Internet, but many of these databases have been developed in an ad hoc manner rather than in accordance with any data...
Arran D. Stewart, Xiuzhen Zhang
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 10 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...