Sciweavers

442 search results - page 77 / 89
» Adapting to Application Workflow in Processing Data Integrat...
Sort
View
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
14 years 2 days ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
ICDT
2012
ACM
251views Database» more  ICDT 2012»
11 years 11 months ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
ECCV
2004
Springer
14 years 10 months ago
Shape Reconstruction from 3D and 2D Data Using PDE-Based Deformable Surfaces
In this paper, we propose a new PDE-based methodology for deformable surfaces that is capable of automatically evolving its shape to capture the geometric boundary of the data and ...
Ye Duan, Liu Yang, Hong Qin, Dimitris Samaras
SIGMOD
2010
ACM
228views Database» more  SIGMOD 2010»
14 years 1 months ago
Probabilistic string similarity joins
Edit distance based string similarity join is a fundamental operator in string databases. Increasingly, many applications in data cleaning, data integration, and scientific compu...
Jeffrey Jestes, Feifei Li, Zhepeng Yan, Ke Yi
SIGIR
2009
ACM
14 years 3 months ago
CompositeMap: a novel framework for music similarity measure
With the continuing advances in data storage and communication technology, there has been an explosive growth of music information from different application domains. As an effe...
Bingjun Zhang, Jialie Shen, Qiaoliang Xiang, Ye Wa...