Sciweavers

38 search results - page 3 / 8
» Adapting databases and WebDAV protocol
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 8 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
VLDB
2005
ACM
106views Database» more  VLDB 2005»
14 years 1 months ago
Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance
We study the problem of applying adaptive filters for approximate query processing in a distributed stream environment. We propose filter bound assignment protocols with the obj...
Reynold Cheng, Ben Kao, Sunil Prabhakar, Alan Kwan...
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
14 years 1 months ago
Wide-Area Replication Support for Global Data Repositories
Wide-area replication improves the availability and performance of globally distributed data repositories. Protocols needed for maintaining replication consistency may cause an un...
Hendrik Decker, Luis Irún-Briz, Rubé...
RTCSA
2007
IEEE
14 years 1 months ago
Virtual Full Replication by Adaptive Segmentation
We propose Virtual Full Replication by Adaptive segmentation (ViFuR-A), and evaluate its ability to maintain scalability in a replicated real-time database. With full replication ...
Gunnar Mathiason, Sten F. Andler, Sang Hyuk Son
ECCV
2006
Springer
14 years 9 months ago
Face Authentication Using Adapted Local Binary Pattern Histograms
In this paper, we propose a novel generative approach for face authentication, based on a Local Binary Pattern (LBP) description of the face. A generic face model is considered as ...
Sébastien Marcel, Yann Rodriguez