Sciweavers

463 search results - page 14 / 93
» Database De-Centralization - A Practical Approach
Sort
View
MLMI
2005
Springer
14 years 1 months ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio
VLDB
2004
ACM
113views Database» more  VLDB 2004»
14 years 1 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
ASIAN
2000
Springer
156views Algorithms» more  ASIAN 2000»
14 years 24 days ago
Reusing Animations in Databases for Multimedia Presentations
Abstract. Multimedia presentations and their applications are becoming more and more popular in most spheres of industry and everyday life. A database approach could help in queryi...
Zhiyong Huang, Binjia Jiao, B. Prabhakaran, Conrad...
VLDB
1990
ACM
101views Database» more  VLDB 1990»
14 years 14 days ago
Non-Monotonic Knowledge Evolution in VLKDBs
Non-monotonic knowledge evolutions and exceptions constitute a complex theoritical and practical problem. The state of the art shows a rich and surprising diversity of approaches....
Christian Esculier
SDMW
2009
Springer
14 years 3 months ago
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance
Abstract. Database provenance chronicles the history of updates and modifications to data, and has received much attention due to its central role in scientific data management. ...
Jing Zhang, Adriane Chapman, Kristen LeFevre