Sciweavers

3943 search results - page 654 / 789
» Architecture-Level Requirements Specification
Sort
View
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
16 years 6 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
ICDE
2009
IEEE
170views Database» more  ICDE 2009»
16 years 6 months ago
Semantics of Ranking Queries for Probabilistic Data and Expected Ranks
Abstract-- When dealing with massive quantities of data, topk queries are a powerful technique for returning only the k most relevant tuples for inspection, based on a scoring func...
Graham Cormode, Feifei Li, Ke Yi
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
16 years 6 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
ICIP
2006
IEEE
16 years 6 months ago
Macroblock-Level Mode Based Adaptive in-Band Motion Compensated Temporal Filtering
This paper presents an adaptive in-band motion compensated temporal filtering (MCTF) scheme for 3-D wavelet based scalable video coding. The proposed scheme solves the motion mism...
Anyu Gao, Cedric Nishan Canagarajah, David R. Bull
ICIP
2003
IEEE
16 years 6 months ago
Watermarking with knowledge of image database
The goal of this paper is to study how a-prior knowledge of the image database could be exploited for better watermarking performance. Unlike most formulations, where the encoder ...
S. Roy, E.-C. Chang