Sciweavers

2071 search results - page 403 / 415
» Behaviour Management in Database Applications
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
WEBDB
2010
Springer
152views Database» more  WEBDB 2010»
14 years 16 days ago
Popularity-Guided Top-k Extraction of Entity Attributes
Recent progress in information extraction technology has enabled a vast array of applications that rely on structured data that is embedded in natural-language text. In particular...
Matthew Solomon, Cong Yu, Luis Gravano
CG
2004
Springer
13 years 7 months ago
ANTS--Augmented Environments
When interacting with natural or urban environments there are many situations where the ability to access data in real time becomes relevant. Augmented Reality (AR) technologies a...
Teresa Romão, Nuno Correia, A. Eduardo Dias...
FAST
2009
13 years 5 months ago
Enabling Transactional File Access via Lightweight Kernel Extensions
Transactions offer a powerful data-access method used in many databases today trough a specialized query API. User applications, however, use a different fileaccess API (POSIX) wh...
Richard P. Spillane, Sachin Gaikwad, Manjunath Chi...
GIS
2003
ACM
14 years 8 months ago
Statistical tools for regional data analysis using GIS
A GIS provides a powerful collection of tools for the management, visualization and analysis of spatial data. These tools can be even more powerful when they are integrated with s...
Konstantin Krivoruchko, Carol A. Gotway, Alex Zhig...